BL Companies | Employee Handbook | 2022
Computers, computer files, the e-mail system and software furnished to employees are BL Companies’ property intended for Company business.
BL Companies reserves its right to monitor its e-mail system – including an employee’s mailbox – at its discretion. In certain situations, BL Companies may be compelled to access and disclose messages sent over its e-mail system.
Employees should not use a password, access a file or retrieve any stored communication without authorization. To ensure compliance with this policy, computer usage may be monitored. Employees shall not share an e-mail password, provide e-mail access to an unauthorized user or access another user’s e-mail box without authorization.
BL Companies provides laptop and tablet computers to certain employees at the Company’s expense. These computers are provided to enable these employees to perform work while traveling for the Company or at home (after normal business hours). It is understood that any employee who receives a laptop or tablet computer from the Company will use it only for work related purposes Although used by employees, these laptops and tablets shall remain the property of the Company and must be returned to the Company upon request or separation of employment.
The existence of passwords and “message delete” or “message unsent” functions do not restrict or eliminate BL Companies’ ability or right to access electronic communications.
BL Companies purchases and
licenses the use of various computer software for business purposes and does not own the copyright to this software or its related documentation.
Offensive, demeaning or disruptive messages are prohibited. Employees shall not post, display or make easily available any access information or messages, which are derogatory, defamatory, obscene, threatening or otherwise inappropriate.
Unless authorized by the software developer, BL Companies does not have the right to reproduce such software for the use on more than one (1) computer.
Employees may only use software on local area networks or on multiple machines according to the software license agreement. BL Companies prohibits the illegal duplication of software and its related documentation.
Employee e-mail communications are not considered private despite any such designation either by the sender or the recipient.
Messages sent to recipients outside of BL Companies are not secure.
All e-mail correspondence is the property of BL Companies.
E-mail should also be used solely for business purposes.
18 Employee Handbook BL Companies
Made with FlippingBook Online newsletter creator