Email Policy (E113)


 
Email Policy

This document contains a policy to issue to employees to ensure appropriate use of e-mail and internet at work.

In five straight-forward clauses, the document sets out compliance with relevant UK and international legislation, applicability, policy requirements, use of e-mail, use of internet and internet downloads and the employer’s right to ensure compliance with the policy through the use of monitoring, where appropriate.

You need this document if you are a business owner who wants clear policy guidelines on employee use of e-mail and internet at work.
 


Want more info? - See detailed Explanatory Notes below

ShareThis

Add to favoritesClick here to add this page to your favourites or bookmarks.


 

Buy Email Policy online

£19.00 + VAT

Your contract will be available for download from 'My Account'  immediately after payment.


Our Contracts Are:

  • Written by Expert Lawyers
  • Editable for Your Needs
  • Money-Saving
  • Ready to Download

How to Use ContractStore

You will find this contract in:

Full Catalogue
Policies & Procedures

 

 

 

 


 

What's in it?

Whilst for obvious reasons we can't show you the actual item before you purchase it, we can do the next best thing. We show you the explanatory notes that go with each contract and, in the case of books and forms, a brief summary. These will give you a good idea of the content of the document before you buy it. 

 

Explanatory Notes

This policy is designed to combat the loss of productivity and expense incurred where e-mail or the internet is potentially misused. It complies with the following:

  • Data Protection Act 1998
  • The Employment Practices Data Protection Code: Part 3 Monitoring at work
  • Regulation of Investigatory Powers Act 2000
  • Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 (‘TICR’)

1. INTRODUCTION

In clause 1.4 it is suggested that a senior member of the management team is appointed with overall responsibility for the policy and implications. This person would also authorise monitoring of individual employees.

2. THE POLICY

There are two approaches outlined in this section of the policy. The first is a complete ban on use of internet and e-mail for personal use which is preferable but may be impractical. One way of managing this in the work place is to have a designated workstation for personal use only which can be booked. This allows a greater level of control. The second approach is to allow but strictly control a degree of personal use.

3. E-MAIL

It is important to link this policy with any existing policies regarding harassment and equal opportunities.

5. MONITORING OF E-MAIL AND INTERNET USAGE

A clear policy statement should avoid the need for monitoring. Monitoring of an employee’s e-mails etc is a complex area of the law and is only recommended if strictly necessary.

It is imperative to comply with the above that any monitoring of e-mail is balance against an individual’s right to privacy. In order to assess this the Code suggests an impact assessment is carried out prior to any monitoring taking place to assess whether it is appropriate. It can be formal or informal.

You will need to:

  • Identify the purpose behind the monitoring
  • Identify any adverse impact
  • Consider and implement alternatives, where practical. This could include training and ensuring clear communication on what is or isn’t acceptable
  • Any adverse impact on an employee’s right to privacy must be proportionately justified by the benefits of monitoring to the employer and others.

Covert monitoring is governed by TICR and should only be undertaken in accordance with its provisions. We have summarised those areas where covert monitoring may be permissible in the second set of bullet points at clause 5.4.

It is advised that one person in the organisation should be nominated as having overall responsibility for the policy and its implications.

Anyone carrying out monitoring needs to have read and understood a copy of the DPA and Code.

Any information gathered through monitoring should only be used for the purpose it is gathered and only for so long as strictly necessary.

Employees have the right to privacy in respect of their personal communications and where possible all personal communications should be excluded from monitoring.

Back to top

 

 

 

 

Important Notice
This notice applies to all materials and information available on this website.

The contents of this site are protected by copyright. They may not be reproduced, distributed or published in any way without the consent of The ContractStore Ltd.

All information and materials on this site are provided on an 'as is' basis and are not intended in any way to be comprehensive. Any reader making use of this site does so at his/her own risk and readers are advised to take independent professional advice before acting on any information or materials found here. The ContractStore Ltd accepts no responsibility and gives no representations or warranties, express or implied, that any of the information and materials on this site are complete, accurate or free from errors or omissions.

Registered office: Acre House, 11/15 William Road, London NW1 3EW, United Kingdom
©ContractStore Ltd, 2012. All rights reserved.

Contact us | About us | CookiesCopyright notice | Terms and Conditions

 We use cookies to provide visitors with a good user experience. New regulations mean we need your consent for this use. For more information click here