BL Companies | Employee Handbook | 2024

Device Security - Using Personal Devices Logging into any of BL’s accounts from personal devices such as mobile phones, tablets, or laptops can put BL’s data at risk. Therefore, BL Companies does not allow access to any Company data from personal devices except for email, Microsoft Teams, and multifactor authentication on the employee’s personal phone. E-mail, Texts and Other Electronic Communications Emails can carry scams or malevolent software (for example worms, bugs etc.). To avoid virus infection or data theft, BL requires that employees abstain from opening attachments or clicking any links when the attachments or links are not anticipated and check email addresses and names of senders. If an employee is unsure about the legitimacy of the e-mail, the employee should contact the IT Department. Internal and external email, voice mail, text messages and other electronic communications are considered business records and may be subject to discovery in the event of litigation. Employees must be aware of this possibility when communicating electronically within and outside the Company. Employees are responsible for the content of all text, audio, video or image files that

they place or send over the Company’s internet and email systems. No email or other electronic communications may be sent that hides the identity of the sender or represents the sender as someone else. BL Companies’ corporate identity is attached to all outgoing email communications, which should reflect corporate values and appropriate workplace language and conduct. Offensive, demeaning or disruptive messages are prohibited. Employees shall not post, display or make easily available any information or messages which are derogatory, defamatory, obscene, threatening or otherwise inappropriate. BL Companies reserves the right to examine, monitor and regulate email and other electronic communications, directories, files and all other content, including internet use, transmitted by or stored in its technology systems, whether onsite or offsite. The existence of passwords and “message delete” or “message unsent” functions do not restrict or eliminate BL Companies’ ability or right to access electronic communications. Managing Passwords Employees should adhere to these password setting best practices: ▪ Avoid writing down passwords and leaving them unprotected. ▪ Consider changing passwords every

Employee Handbook

Integrity 19

Made with FlippingBook - Online Brochure Maker