SlideShare a Scribd company logo
2
Most read
4
Most read
6
Most read
Email & internet
INTRODUCTION
   In today's workplace the use of Internet and
    emails has dramatically increased all over the
    world. Computers have revolutionized the way
    we conduct our daily life's and business. With
    the rise of the internet and emails in the
    workplace brings new business fundamentals to
    meet. These fundamentals must meet our
    demands in the workplace to ensure timely
    performance. Workplace policies should be
    implemented in a workplace to prevent time
    wastage.
INTERNET NEWS TODAY
 Over the last 40 years technology has
  developed in the workplace with use of
  computers
 Use of computers continues to soar in the
  21st century
 Humans rely on computers to perform
  daily routine duties
DEFINITION OF INTERNET
 The word internet is described is many
 ways. The best way to describe the word
 internet to you would be, a computer
 system that allows millions of computer
 users around the world to share, transmit
 and exchange information.
DEFINITION OF EMAIL
 Is defined as a systemthat allows people
 to send messages to each other by
 computer electronically.
STATEMENT OF PURPOSE
   The use of a company’s internet and email
    access must be developed to provide clear and
    precise guidelines for all employees (including
    external contractors and consultants using the
    company’s computer system) as to what
    constitutes acceptable use and what is
    considered as unacceptable use. The aim of this
    policy is to ensure that all employees using the
    company internet, intranet and e-mail system do
    so in a climate of mutual respect, ensuring at all
STATEMENT OF PURPOSE
   times that the confidentiality of company
    information is preserved. The company does not
    wish to discourage reasonable private use and
    will respect the privacy of employees in any
    monitoring situations in accordance with the
    provisions of the Workplace Surveillance Act
    2005 (NSW) and the Privacy Act 1988 (Federal).
DEVELOPMENT
 Consultation
 Coverage
 Cleary defined
 Employees rights and obligations
 Implementation
 Conflict resolution
 Monitoring
 Breach of policy
KEY POLICY ELEMENTS
 Pop up warnings
 Training prior to implementation
 No harassment or abuse
 No copy right
 Maximum personal usage
30 minutes/day       90 minutes/week
 Social networking sites             Maximum 5
  minutes/day
 Usage Records may be used in Litigation
 NO blocking by Company of IR Related Transmissions
IMPLEMENTATION
   Advise of Commencement Date
   Added to Induction Training for New Staff
    Members
   Training – Group and Individual
   Clearly Define - Inappropriate use, inappropriate
    use
   Sign-Off on Completion of Training
   Distribute Policy to all Staff
   Encourage Feedback from all Staff
   Conflict Resolution Strategies in Place
CONFLICT RESOLUTION
   Initial Feedback to Reduce Potential Problems
   All Complaints/Problems Addressed
    Immediately
   Refresher Training Where Appropriate
   Advise Consequences of Repetition of
    Infringement
   Ensure Breach Penalties in line with Policy
   Ensure Consistent Application of Conflict
    Resolution Strategies
CONFLICT RESOLUTION
  Clearly Define Terminology example-
   Pornographic, Offensive, etc…..
 Breach Penalties Based on Severity :

- Counseling
- Warning
- Suspension
- Dismissal
 Policy to be Administered Consistently
 Policy to be Reviewed and Updated regularly

More Related Content

DOCX
Computer Worksheet Class 8 with answers
PPT
Chapter 1 Internet and e-mail.ppt
PPTX
The internet
PDF
Introduction to Internet
PPTX
Networking and internet
PPTX
Internet
PPTX
Internet browsing
PPTX
First step to internet
Computer Worksheet Class 8 with answers
Chapter 1 Internet and e-mail.ppt
The internet
Introduction to Internet
Networking and internet
Internet
Internet browsing
First step to internet

What's hot (20)

PPTX
Computer aided teaching and testing
PPTX
Disk operating system
PPTX
Applications of computers
PPTX
Email: Introduction
PPTX
Introduction to Windows
PPT
PPT
Introduction to Computer Applications
PPTX
Electronic mail
PPTX
Basic computer skills
PPTX
Advantages and disadvantages of computer system
PPT
Introduction to Internet
PPTX
Internet terminologies
PPTX
Computer in nursing
PPTX
The Internet (Nursing Informatics)
PPTX
Types of internet connections
PPTX
Ppt on internet
PPTX
COMPUTER AND ITS USES
PPTX
Windows presentation
PPTX
Characteristics of Computer
PPTX
An introduction to networking
Computer aided teaching and testing
Disk operating system
Applications of computers
Email: Introduction
Introduction to Windows
Introduction to Computer Applications
Electronic mail
Basic computer skills
Advantages and disadvantages of computer system
Introduction to Internet
Internet terminologies
Computer in nursing
The Internet (Nursing Informatics)
Types of internet connections
Ppt on internet
COMPUTER AND ITS USES
Windows presentation
Characteristics of Computer
An introduction to networking
Ad

Viewers also liked (20)

PPT
Presentation1.Ppt Email And Internet
PPT
E Mail Ppt
PPT
Email ppt
PPT
Internet Slide Show
PPT
Electronic mail
PPT
The Internet Presentation
PPT
Social Bookmarking in Education
PPT
The Importance Of Networking
PPTX
Blended learning slideshare
PPT
The Importance Of Professional Networking
PPTX
E governance in agricultural sector
PPTX
Surfing the web
PPTX
Introduction to-internet-n-emails
PPT
The Importance of Networking
PPTX
Social Media and Relationships
PPTX
Electronic clearing service (ecs)
PPTX
E learning
PPTX
Blended learning
Presentation1.Ppt Email And Internet
E Mail Ppt
Email ppt
Internet Slide Show
Electronic mail
The Internet Presentation
Social Bookmarking in Education
The Importance Of Networking
Blended learning slideshare
The Importance Of Professional Networking
E governance in agricultural sector
Surfing the web
Introduction to-internet-n-emails
The Importance of Networking
Social Media and Relationships
Electronic clearing service (ecs)
E learning
Blended learning
Ad

Similar to Email & internet (20)

PPT
Workplace environment e-mail_and_internet_privacy_at_work
PPTX
Internet Policy Final Project (Group 6)
PPTX
Computer Basics in the Work Place
DOCX
Internet policy
PPT
Employee Misuse of Internet and Blogosphere
PPTX
Code of Conduct Code of Security Code of Security
DOCX
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
DOCX
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
PPTX
Presentation1
PDF
Computer, E-mail and Internet Usage Policy and Procedure
PPTX
Electronic communicationsppt
DOCX
Risk Management of Email and Internet Use in the Workplace by John.docx
PDF
Workplace strategies for protecting confidential and proprietary property
PPTX
MONITORING EMPLOYEES ON NETWORKS
PPTX
Monitoring employees at office - Good or bad practice?
PPT
Internet Misuse inside the Company
PPT
20-MOD 8 Self and Work Management-20-07-2023.ppt
PPT
Organizational Communication (Shaun)
PPT
Organizational Communication (Shaun)
PDF
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Workplace environment e-mail_and_internet_privacy_at_work
Internet Policy Final Project (Group 6)
Computer Basics in the Work Place
Internet policy
Employee Misuse of Internet and Blogosphere
Code of Conduct Code of Security Code of Security
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
Presentation1
Computer, E-mail and Internet Usage Policy and Procedure
Electronic communicationsppt
Risk Management of Email and Internet Use in the Workplace by John.docx
Workplace strategies for protecting confidential and proprietary property
MONITORING EMPLOYEES ON NETWORKS
Monitoring employees at office - Good or bad practice?
Internet Misuse inside the Company
20-MOD 8 Self and Work Management-20-07-2023.ppt
Organizational Communication (Shaun)
Organizational Communication (Shaun)
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE

More from smartware (9)

DOCX
Contoh Minit mesyuarat guru
DOCX
Isi kandungan papan certa
DOCX
Manik curai dskp mpv
DOCX
Jadual bertugas kem pemimpin muda (2)
DOCX
Surat mohon jurulatih silat
DOCX
Kertas kerja pemantapan mpkk
DOCX
Kisah sahabat Saidina Othman Affan
DOC
Pelan jangka panjang ict
PPT
Komponen komponen komputer
Contoh Minit mesyuarat guru
Isi kandungan papan certa
Manik curai dskp mpv
Jadual bertugas kem pemimpin muda (2)
Surat mohon jurulatih silat
Kertas kerja pemantapan mpkk
Kisah sahabat Saidina Othman Affan
Pelan jangka panjang ict
Komponen komponen komputer

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
102 student loan defaulters named and shamed – Is someone you know on the list?
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Open Quiz Monsoon Mind Game Final Set.pptx
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pre independence Education in Inndia.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
GDM (1) (1).pptx small presentation for students
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Pharma ospi slides which help in ospi learning

Email & internet

  • 2. INTRODUCTION  In today's workplace the use of Internet and emails has dramatically increased all over the world. Computers have revolutionized the way we conduct our daily life's and business. With the rise of the internet and emails in the workplace brings new business fundamentals to meet. These fundamentals must meet our demands in the workplace to ensure timely performance. Workplace policies should be implemented in a workplace to prevent time wastage.
  • 3. INTERNET NEWS TODAY  Over the last 40 years technology has developed in the workplace with use of computers  Use of computers continues to soar in the 21st century  Humans rely on computers to perform daily routine duties
  • 4. DEFINITION OF INTERNET  The word internet is described is many ways. The best way to describe the word internet to you would be, a computer system that allows millions of computer users around the world to share, transmit and exchange information.
  • 5. DEFINITION OF EMAIL  Is defined as a systemthat allows people to send messages to each other by computer electronically.
  • 6. STATEMENT OF PURPOSE  The use of a company’s internet and email access must be developed to provide clear and precise guidelines for all employees (including external contractors and consultants using the company’s computer system) as to what constitutes acceptable use and what is considered as unacceptable use. The aim of this policy is to ensure that all employees using the company internet, intranet and e-mail system do so in a climate of mutual respect, ensuring at all
  • 7. STATEMENT OF PURPOSE  times that the confidentiality of company information is preserved. The company does not wish to discourage reasonable private use and will respect the privacy of employees in any monitoring situations in accordance with the provisions of the Workplace Surveillance Act 2005 (NSW) and the Privacy Act 1988 (Federal).
  • 8. DEVELOPMENT  Consultation  Coverage  Cleary defined  Employees rights and obligations  Implementation  Conflict resolution  Monitoring  Breach of policy
  • 9. KEY POLICY ELEMENTS  Pop up warnings  Training prior to implementation  No harassment or abuse  No copy right  Maximum personal usage 30 minutes/day 90 minutes/week  Social networking sites Maximum 5 minutes/day  Usage Records may be used in Litigation  NO blocking by Company of IR Related Transmissions
  • 10. IMPLEMENTATION  Advise of Commencement Date  Added to Induction Training for New Staff Members  Training – Group and Individual  Clearly Define - Inappropriate use, inappropriate use  Sign-Off on Completion of Training  Distribute Policy to all Staff  Encourage Feedback from all Staff  Conflict Resolution Strategies in Place
  • 11. CONFLICT RESOLUTION  Initial Feedback to Reduce Potential Problems  All Complaints/Problems Addressed Immediately  Refresher Training Where Appropriate  Advise Consequences of Repetition of Infringement  Ensure Breach Penalties in line with Policy  Ensure Consistent Application of Conflict Resolution Strategies
  • 12. CONFLICT RESOLUTION  Clearly Define Terminology example- Pornographic, Offensive, etc…..  Breach Penalties Based on Severity : - Counseling - Warning - Suspension - Dismissal  Policy to be Administered Consistently  Policy to be Reviewed and Updated regularly