Free Essay

Email Policy

In:

Submitted By tridentpapers
Words 1021
Pages 5
The purpose of this policy is to ensure the proper use of company’s email system and to make all employees aware of what the company deems as acceptable and unacceptable use of its email system. The company reserves the right to amend this policy at its discretion. In case of amendments, users will be informed appropriately. The policies are outlined below. The company considers email as an important means of communication and recognizes the importance of proper email content and speedy replies in conveying a professional image and delivering good customer service. Therefore the company wishes users to adhere to the following guidelines:
• Writing emails: o Write well-structured emails and use short, descriptive subjects. o Email style is informal. This means that sentences can be short and to the point. You can start your e-mail with ‘Hi’, or ‘Dear’, and the name of the person. Messages can be ended with ‘Best Regards’. The use of Internet abbreviations and characters such as smileys however, is not encouraged. o Signatures must include your name, job title and company name. A disclaimer will be added underneath your signature. o Use the spell checker before you send out an email. o Do not send unnecessary attachments. Compress attachments larger than 200K before sending them. o Do not write emails in capitals. o Do not use cc: or bcc: fields unless the cc: or bcc: recipient is aware that you will be copying a mail to him/her and knows what action, if any, to take. o If you forward mails, state clearly what action you expect the recipient to take. o Only send emails of which the content could be displayed on a public notice board. If they cannot be displayed publicly in their current state, consider rephrasing the email, using other means of communication, or protecting information by using a password. o Only mark emails as important if they really are important.
• Replying to emails: o Emails should be answered within at least 8 working hours, but users must endeavor to answer priority emails within 4 hours. o Priority emails are emails from existing customers and business partners.
• Newsgroups: o Users need to request permission from their supervisor before subscribing to a newsletter or news group.
• Maintenance: o Delete any email messages that you do not need to have a copy of, and set your email client to automatically empty your ‘deleted items’ on closing.
• Personal Use Although the company’s email system is meant for business use, the company allows the reasonable use of email for personal use if certain guidelines are adhered to: o Personal use of email should not interfere with work. o Personal emails must also adhere to the guidelines in this policy. o Personal emails must be kept in a separate labeled folder. The emails in this folder must be deleted weekly so as not to clog up the system. o The forwarding of chain letters, junk mail and jokes is strictly forbidden. o On average, users are not allowed to send more than 2 personal emails a day. o Do not send mass mailings. o All messages distributed via the company’s email system, even personal emails, are the company’s property.
• Confidential information Avoid sending confidential information by e-mail. If you do, you must secure the information by including it in a Microsoft Word or Excel file and protecting it with a password and encrypt it. Then provide the recipient with the password by means of other communication, for instance by telephone.

• Disclaimer
The following disclaimer will be added to each outgoing email: ‘This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. Please note that any views or opinions presented in this email are solely those of the author and do not necessarily represent those of the company. Finally, the recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.’ Summary These principles that are outlined in this policy are so that everyone at the company understands what is expected of them in regards to email communication. The policy also protects the company from any legal issues, such as if an employee decides to send any libelous, defamatory, offensive, racist or obscene remarks. Email is a business communication tool and users are obliged to use this tool in a responsible, effective and lawful manner. Although by its nature email seems to be less formal than other written communication, the same laws apply. Therefore it is important that users are aware of the legal risks of e-mail. By following the guidelines in this policy, the email user can minimize the legal risks involved in the use of e-mail. If any user disregards the rules set out in this Email Policy, the user will be fully liable and the company will disassociate itself from the user as far as legally. I wrote the message this way because I wanted to get straight to the point and ensure that the employees understand the policy, that’s the reason I put them in bullet format so that each point of the policy was emphasized. I utilized the background information on routine email messages and memos, where I utilized Guffrey’s 3-x-3 Writing Process. I chose the best mode of communication, determined my purpose in writing. I also researched and organized all the relevant data in regards to this policy. I structured the email based off the background information, which are the subject line, opening statement and body. I also followed the guideline of the background article titled e-mail is easy to write and to misread, where it states that if you are not clear about what are sending in an email it could be misinterpreted and send the wrong message. In the email policy I wrote I ensured that it was straight forward, clear and to the point.

Similar Documents

Premium Essay

Email Security Policy Paper

...Email Security Policies Introduction: Email is the feature where we can send or receive messages with a valid email address anywhere in the world.Electronic plays a vital role in todays communication. In the corporate world, security for information and for the whole organization is very necessary.Data security is of primary concern of an enterprise nowadays. Protecting data from unauthorized access by users and software applications is known as privacy.Thus it is important for users to gain knowledge about the use of electronic communications. Purpose: The purpose of Email policy is to ensure that this critical service remains available and reliable, and is used for purposes appropriate to the...

Words: 1160 - Pages: 5

Free Essay

You Decide 3

...filtering is leverage. It allows you to provide, in a single place, particular protections for an entire network. Consider the Telnet service. If you disallow Telnet by turning off the Telnet server on all your hosts, you still have to worry about someone in your organization installing a new machine (or reinstalling an old one) with the Telnet server turned on. On the other hand if Telnet is not allowed by your filtering router, such a new machine would be protected right from the start, regardless of whether or not its Telnet server was actually running. Another advantage of a packet filtering router is that users won’t even realize it’s there, unless they try to do something that is prohibited by the packet filtering router’s filtering policy ("Building Internet Firewalls," n.d.). Secondly, you can use port blocking which is the prevention of a given communication on a specific port before it reaches your computer. Port 25 is the SMTP port used by mail servers to send mail. The popular trend...

Words: 622 - Pages: 3

Premium Essay

Personal Internet Based Email Policy

...APPENDIX Employee Handbook 2013 Personal Internet Based Email Policy Purpose Over the last few years the use of email has become predominant in society and most people have multiple accounds. As technology has advanced it has become easier to access personal email from anywhere, especially through the use of internet based email. These internet based email services offer great ease of access; however, they also make it easier to enable the delivery of malware and virus’s into the company infrastructure and must be used with care and awareness. The Personal Internet Based Email Policy lays out the guidelines adopted by Richman Investments in this regard. These guidelines determine the expectations of personal conduct by Richman Investments personnel while engaging in the use of Personal Internet Based Email from Richman Investments computers and networks. Definition Employees will be held accountable for any malicious software, virus, or spyware downloaded or inserted onto Richman Investments computers or networks from a personal account. Policy Richman Investments employees who choose to access Personal Internet Based Email will be held to high professional standards. Personal Internet Based Email accounts can be a useful tool to help our employees maintain a work life balance, however, if used incorrectly or abused, can be detrimental. If there is any confusion in regards to online behavior, refer to the suggested guidelines below before accessing these accounts...

Words: 567 - Pages: 3

Premium Essay

Employee Internet and Email Acceptable Use Policy

...Acceptable Use Policy Internet and Email Employee Responsibilities: The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to a catastrophic results on the company and other employees. Acceptable Uses: General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email. Unacceptable Uses: For Internet Use, the following actions are prohibited: * Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful * Knowingly downloading any materials irrelevant to their work * Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc. For Email Use, the following actions are prohibited: * Accessing inappropriate sites or inappropriate e-mail * Transmitting private mass mailings * Transmitting messages disclosing personal information without authorization. Implementation of Policy: The head of each department is required to file reports of each employees according to their appropriate and inappropriate uses of internet and email. And the...

Words: 298 - Pages: 2

Premium Essay

Bus303 Business Communication

...Touro University International BUS303/MOD1/Case Assignment Dr. Gregory Herbert Create an email (about 450 words) to all your employees to announce an email policy you have just created. You are not persuading: you are announcing. However, you must be tactful and professional. Remember: some of those folks have been around along time and some are beginning their very first jobs. This section of the assignment should include references, properly cited, to articles on the CD. From: William Layne To: Army Bank All 14 October 2008 Subject: Email Policy effective immediately All: Implement the following practices immediately for all internal emails: Subject line will contain the point of the email. You are busy people in a high paced environment. You want to be able to gage the importance of the hundreds of emails you receive in order to prioritize them for maximum efficiency. Email will not be used to begin new projects and collaborations. Face to face meetings will be use to begin all new projects and collaborations. Teams achieve cohesion and synergy by feeding from each other’s energy. You are among the finest work forces around and achieve greater results from actual human interaction with your team mates. Manager or Associate is the title to be used when referring to employees in email traffic. We are an equal opportunity bank and we only see one color, the color of money. Identifying our team members by gender or...

Words: 693 - Pages: 3

Free Essay

Ajs 582 Entire Course

...Information or Any Class Which you Did not find on Our Website, Just Hit US Email On below address Visit : www.homeworkwarehouse.com Email Us : Homeworkwarehouse@gmail.com AJS 582 Entire Course AJS 582 Week 1 DQ1 AJS 582 Week 1 DQ 2 AJS 582 Week 1 Individual Assignment Criminal Justice Policy Process Paper AJS 582 Week 2 DQ1 AJS 582 Week 2 DQ 2 AJS 582 Week 2 DQ3 AJS 582 Week 2 Individual Assignment Criminal Justice Policy-Making Matrix and Paper AJS 582 Week 3 DQ1 AJS 582 Week 3 DQ2 AJS 582 Week 3 DQ3 AJS 582 Week 3 Learning Team Assignment Public Opinion Poll and Paper AJS 582 Week 4 DQ1 AJS 582 Week 4 DQ2 AJS 582 Week 4 DQ3 AJS 582 Week 4 Individual Assignment Policing Policies Analysis AJS 582 Week 5 DQ1 AJS 582 Week 5 DQ2 AJS 582 Week 5 DQ3 AJS 582 Week 5 Individual Assignment Sentencing Policies Analysis AJS 582 Week 6 DQ1 AJS 582 Week 6 DQ2 AJS 582 Week 6 DQ3 AJS 582 Week 6 Learning Team Assignment Criminal Justice or Security Policy Issues Paper and Presentation AJS 582 Week 6 Learning Team Assignment Criminal Justice or Security Policy Issues Paper and Presentation AJS 582 Entire Course To Purchase this Tutorial Copy And Paste Below Link In Your Browser http://www.homeworkwarehouse.com/downloads/ajs-582-entire-course/ For Any Information or Any Class Which you Did not find on Our Website, Just Hit US Email On below address Visit : www.homeworkwarehouse.com Email Us : Homeworkwarehouse@gmail.com AJS 582 Entire Course AJS 582 Week 1...

Words: 464 - Pages: 2

Premium Essay

Best Ever

...Salix Pharmaceuticals Security Policy Introduction The Salix Pharmaceuticals Security Policy Template is for the use of creating a strong security policy. Each sub policy contains a title with a description and a brief summary of what the certain section will contain. The purpose of the security policies is to ensure that Salix Pharmaceuticals is safe and under strong commands. The Salix Pharmaceutical Security Policy should be reviewed when new materials and changes are to be preceded amongst this company. Scope Salix Pharmaceuticals security policy will keep the company running for years if followed by the procedures. Following the sub policies will lead to a successful company that will be ran smooth and processed like no other company. Antivirus, encryption, passwords, and backups will protect this company like no other before. Purpose Salix purpose for the security template is to have the company, employees, managers, assistant manager, and volunteer’s, and temporary follow all these policies to make the company operate under a easy and fast pace. By making this policy the company should be protected from several things and kept up to date on every policy. Employees should obey this policy and read over every so often in case changes and updates are needed to be added. Acceptable Use Workers must report any signs of violation and a misunderstanding of the policies. Workers are not allowed to access any information they do not have the authority to look...

Words: 1087 - Pages: 5

Free Essay

Business

...of internet, social Media and e-mail out with the workplace does not impact adversely on the council and its business, compromise their contractual relationship with the council or breach council policy. This policy sets out the expected standards of internet, social media and email use and provides for those standards to be monitored and enforced. The content should be read in conjunction with the relevant employment policies referred to in this document together with other policies and guidance issued by the council’s IT Service, in particular the Data Protection and Information Security Policies. The key aims of the policy are to: * Regulate and control access to the council’s internet, social media and e-mail system networks; * Promote efficient and effective use of internet, social media and e-mail facilities while allowing reasonable and limited personal use in an employee’s own time; * Set standards for the proper secure and lawful use of internet, social media and e-mail in order to minimise and manage the potential risks to the council from inappropriate and illegal use; * Provide employees with guidance on their responsibilities when accessing the internet via the council networks and when using social media and council email applications. This policy applies to the use of internet, social media and e-mail in the following circumstances: * Business Use: Use for legitimate council business consistent with the duties and responsibilities of an...

Words: 481 - Pages: 2

Free Essay

Security Polcies

...good work. Professor C Information Security Fundamentals Week 3 Security Policies 08 July 2012 Although the sample email use policy is very generic it does outline specific requirements and rules that must be met. The general restrictions are clear, covering prohibited use. It states that the company email system shall not be used for the creation or distribution of any disruptive, offensive, or discriminatory messages. It addresses prohibited emails and emails that need the VP of Operations approval and the consequences for violating the policy. This email policy does not recognize personal privacy in email, but it allows for a “reasonable amount” of company resources for personal emails. However, this is confusing because it does not define or list the restrictions of personal use. If the business is relatively small than this generalized usage policy would be effective, but for mid to large sized organizations a more in depth email use policy that is part of a larger policy should be developed. In practice, this sample issue-specific policy would not suffice for the majority, but it is a good basic outline. Organizations that have trade secrets to protect, hospitals, government agencies, and financial institutions would need to dissect this particular policy to identify its strengths and alter its weaknesses. A few of its noticeable weak points are: 1. A formal header – The policy identifies the company and a clear title, but it lacks who’s issuing it, if...

Words: 514 - Pages: 3

Premium Essay

Developing Yourself as an Effective Hr Practioner

...to know for each area of the HR profession at four bands of professional competence * 4 bands of professional competence. I have focused on the professional area “Employee Relations” and looked at the activities and knowledge that I feel are most essential to my role. * It is important when dealing with ER that policies and procedures are accurately kept up to date, this includes ensuring that all contractual documents, staff handbook and policies are in line with current legislation. If the information is not in line with legislation this places the organisation at great risk and therefore accurate knowledge and information is very important. I have found that I have gained knowledge through experience in the HR field and I also use other sources to ensure that my knowledge is up to date by seeking advice from other HR professionals, referring to text books, researching the internet or the CIPD website. * I implement guidelines on a regular basis when new information is received and I ensure that the staff handbook is updated accordingly. Our handbook is kept on the Company intranet and all employees and managers are notified by email when any changes are made to...

Words: 630 - Pages: 3

Premium Essay

Acceptable Use Policy

...The Company provides employees with electronic communications tools, including an Email System. This written Email Policy, which governs employees’ use of the Company’s email system, applies to email use at the Company’s headquarters and district offices, as well as at remote locations, including but not limited to employees’ homes, airports, hotels, client and supplier offices. The Company’s email rules and policies apply to full-time employees, part-time employees, independent contractors, interns, consultants, suppliers, clients, and other third parties. Any employee who violates the Company’s email rules and policies is subject to disciplinary action, up to and including termination. Email Exists for Business Purposes The Company allows email access primarily for business purposes. Employees may use the Company’s email system for personal use only in accordance with this policy. Employees are prohibited from using personal email software (Hotmail, etc.) for business or personal communications at the office. Authorized Personal Use of Email Employees may use email to communicate with spouses, children, domestic partners, and other family members. Employees’ personal use of email is limited to lunch breaks and work breaks only. Employees may not use email during otherwise productive business hours. Employees are prohibited from using email to operate a business, conduct an external job search, solicit money for personal gain, campaign for political causes or candidates...

Words: 814 - Pages: 4

Premium Essay

Bsbadm504B Plan and Implement Administration System

...assessor. Submit this document with any required evidence attached. See specifications below for details. Performance objective In this assessment task you will demonstrate skills and knowledge required to plan or review administration systems and implement new or modified administration systems. Assessment description Within a real or simulated business context, you will plan a new administration system or review an existing system. You will need to: ● consult with users or stakeholders to develop a detailed specification for the new or revised system, which must meet both organisational needs and external requirements such as codes of practice or legislation ● follow organisational procurement policies to select an appropriate developer or supplier ● prepare detailed planning for the implementation of the system, including communication, training and risk management activities. Procedure 1. In consultation with your assessor, nominate (a) an appropriate workplace context and (b) an administration systems project to undertake to meet assessment requirements set out in this document. You may choose: ○ the creation of a...

Words: 1683 - Pages: 7

Premium Essay

It255 Final Project

...Project part.2 Corporate security policy (7) Dear Richman Investments Senior Management – It has come to my attention that your corporate security policy for the firm is out of date and that it needs to be updated. In my time here as an intern I have reviewed the security policy and revised it to keep up with all of the technological updates going on in the internet world today. I was assigned this project and being that we have 5000 employees operating in different locations and different parts of the country; I have noticed that some of the other branches do not follow the firms’ policies as they should. Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers emails, mobile devices, computer usage, email retention policies, passwords, etc. I hope this will help streamline our security policy across the board so that everyone is on the same page and so there is no misinterpretation of the firm employee or otherwise. RICHMAN INVESTMENTS CORPORATE SECURITY POLICY Use of Phone and Mail Systems Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To...

Words: 1596 - Pages: 7

Free Essay

Acceptable Use Policy Definition

...Acceptable Use Policy (AUP) Definition After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a doctor’s...

Words: 324 - Pages: 2

Free Essay

Unit 6 Exercise

...Systems Administrator To: Manager Subj: Support Prioritization First, let me thank you for notifying me of any problems and/or complaints. This way we may implement a proper plan of action and I agree that a ticket escalation policy is the way to go to achieve this. I will start drafting a policy for how support requests will be prioritized in the immediate future according to what you have requested. Each end-user or department head may call me, email me or both stating what department they are with and the technical issue that is occurring and at what workstation it is occurring. Each technical issue will receive a work order number, each work order will contain all information that they have provided and the date and time received. I will assign each work order a level of urgency as they arrive 1-4, 1 being the most urgent and 4 being the least. These will be prioritized by department as requested as follows 1: Customer Service 2: Sales 3: Accounting 4: Marketing. Each department head will receive a copy of said work order as well. The new policy should be a great way to manage both business and end-user expectations. I believe we can better manage these requirements by not only each department but each employee receiving a copy of the policy as well once it is finalized. Thank you again and please let me know if there is anything you would like me to add to the...

Words: 253 - Pages: 2