Presentation is loading. Please wait.

Presentation is loading. Please wait.

Appropriate Internet Use

Similar presentations


Presentation on theme: "Appropriate Internet Use"— Presentation transcript:

1 Appropriate Internet Use
11/21/2019 Appropriate Internet Use Note to Trainer: This Training Module provides all of the materials needed to conduct an effective classroom-training course: 1. PowerPoint slides with suggested narration (though you should feel free to customize the narration to be specific to your organization’s culture and/or to highlight issues that your organization has encountered in the past). Interspersed throughout are “In the news…” clippings and “Pop-Quiz” questions and answers pertaining to this topic. A link at the end to an interactive quiz/game that you can use to assess your audience’s understanding of the material. (You will need an Internet connection to access the quiz/game.) You can add your organization’s logo to the slides by inserting it in the “Slide Master” and “Title Master” layouts. Search for “slide master” in PowerPoint’s help guide for instructions. The course is also available online for those who cannot attend the classroom session(s). The online version includes exactly the same content (including the quiz/game) in an interactive format, so you can be sure that online attendees receive the same information as those you train in the classroom. The online version includes full tracking and reporting of employee participation, as well as automated “reminder” s to ensure high completion rates. For more information or to set up the online version, visit Copyright © 2010 WeComply, Inc. All rights reserved.

2 Appropriate Internet Use
11/21/2019 Welcome This training course was developed by WeComply, a leading provider of ethics and compliance training since The course is also available online from any Internet-connected computer. WeComply offers 60+ courses on a wide range of business ethics and compliance topics. Each course helps employees spot key compliance issues and respond appropriately. This course is designed and licensed for classroom use in parallel with WeComply's online course on the same topic. This course may not be hosted on a learning management system or distributed to employees individually by electronic or other means without WeComply's prior authorization. For more information about this course or others, whether for classroom use or online access, please or call WeComply. Note to Trainer: This slide may be removed Copyright © 2010 WeComply, Inc. All rights reserved.

3 Appropriate Internet Use
11/21/2019 Introduction Thank you for participating in our Appropriate Internet Use training course. This course will explain rules and guidelines that you must follow with the computers, phones and/or other electronic devices that you use for work Keep in mind that this material is provided for informational purposes only and is not intended as legal advice. If you have questions about how this material applies to your job responsibilities, please talk to your supervisor. Remember, it is always better to ask first, so that problems can be avoided later. 1 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

4 Appropriate Internet Use
11/21/2019 Overview Internet has revolutionized the way businesses and other organizations operate Appropriate Internet use is essential to our organization Inappropriate use can be extremely detrimental Workplace discrimination Copyright infringement Securities-law and antitrust violations Loss of trade secrets Computer viruses and bandwidth issues Without a doubt, the Internet has revolutionized the way that businesses and other organizations around the world operate. The World Wide Web is now an integral part of many marketing, sales and customer-service strategies and an essential tool in day-to-day job tasks. While appropriate Internet use is essential to our organization, we also recognize that inappropriate use can be extremely detrimental. Improper or indiscriminate instant-messaging, ing, text-messaging, etc., can lead to individual and organizational liability for workplace discrimination (including sexual harassment), copyright infringement, securities-law violations, antitrust violations, the loss of trade secrets, and other legal and practical problems. Likewise, improper Internet surfing, streaming, downloading, etc., can lead to computer viruses, misallocation of available bandwidth, as well as some or all of the legal problems just mentioned. With these issues in mind, we ask you to pay close attention to this training course and report any inappropriate use to your supervisor. 2 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

5 Appropriate Internet Use
11/21/2019 E-communications Electronic communications can create significant legal risks Messages may go out without deliberation/review that typed/proofread letter might receive Humor/sarcasm may be misinterpreted when committed to writing Use special care in all that you do with our e-communication systems Whatever you communicate electronically can be retrieved and traced back to you Electronic communications can create significant legal risks for you and our organization. The apparent informality of , voic and text- and instant-messages may lead people to express things that they would not include in a fax or a letter. The speed with which a message can be created and sent may result in messages going out without the deliberation and review that a typed and proofread letter might receive. And those who use a quick, written missive as a substitute for a face-to-face or phone conversation may find that humor or sarcasm — which may be engaging and effective when spoken — are misinterpreted when committed to writing. We encourage you to use special care in all that you do with our electronic-communication systems. Keep in mind that whatever you communicate electronically can likely be retrieved and traced back to you and our organization. 3 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

6 Private Texts from Public Pager?
Appropriate Internet Use 11/21/2019 Private Texts from Public Pager? High Court OKs Government Employer’s Search of Text Messages The U.S. Supreme Court ruled that a California police department's audit of an officer's text messages to his girlfriend on his department-issued pager did not violate the officer's privacy rights. The Court held that a government employee's communications made on an employer-issued device are not protected by the U.S. Constitution's Fourth Amendment right against unreasonable searches when the employer has a "legitimate work-related purpose" to search them. The Court did not address the broader issue of private-sector employees' privacy rights. 4 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

7 Appropriate Internet Use
11/21/2019 Monitoring and Access We reserve the right to monitor, access and disclose the e-communications and Internet activities of everyone who uses or accesses our system We may monitor — When data on your computer is needed, but you are unavailable When we suspect that someone is making unauthorized or improper use To determine if illegal material/unlicensed software is being stored or used In response to requests in legal or regulatory proceedings For resource-planning purposes Although we want to respect your privacy as much as possible, we must also reserve the right to monitor, access and disclose the electronic communications and Internet activities of everyone who uses or accesses our system. We will not monitor on a routine basis, but we may do so when we believe it is warranted, including — When data on your computer is needed for business purposes, but you are unavailable; When we suspect that someone is making unauthorized or improper use of our property or information systems; To determine if illegal material or unlicensed software is being stored or used on our computer systems; In response to requests in pending or threatened legal or regulatory proceedings; and To monitor usage for resource-planning purposes. 5 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

8 Appropriate Internet Use
11/21/2019 Don’t Tread on MySpace Access to MySpace Comments May Have Violated Privacy Rights After an employee started an invitation-only discussion group on MySpace to "vent" about work, several other co-workers joined. When one co-worker group-member mentioned the group to a manager, the manager asked for her password to view it. Based on the comments, the group's creator and a co-worker participant were fired. A federal district court found the case worthy of a jury trial to determine (1) if the co-worker who relinquished her password did so under duress, and (2) if the employees had a reasonable expectation of privacy for their comments. 6 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

9 Appropriate Internet Use
11/21/2019 Personal Use Computer systems are to be used for carrying out our business needs Personal use that interferes with your work performance is prohibited and will be considered grounds for discipline You should have no expectations of privacy for any e- communication or Internet activities on our information systems Don't rely on deletion or erasure of e-communications as means of keeping them "private" in any respect Our computer systems are to be used for the purpose of carrying out our business needs. While limited or occasional personal use is permitted, personal use that interferes with your work performance is prohibited and will be considered grounds for discipline. Because we cannot readily distinguish business from personal communications, we cannot guarantee that personal communications will be kept private. In other words, you should have no expectations of personal privacy for any electronic communications or Internet activities that you perform while accessing our information systems, whether from home, work or elsewhere. In addition, keep in mind that even after you have apparently "deleted" or "erased" , instant messages, text messages, voic , files or other data, they may remain on our computer systems in a form that can be retrieved if necessary. Accordingly, you should not rely on the deletion or erasure of electronic communications as a means of keeping them "private" in any respect. 7 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

10 Appropriate Internet Use
11/21/2019 Social Networking We can now broadcast content through a vast array of Internet outlets Facebook, LinkedIn, MySpace Blogs, podcasts, YouTube Most social-networking activity occurs during business hours but not for business purposes Social-media use can lead to many types of business/legal issues Certain posts could expose both you and our organization to legal action Posts to social-networking sites can be used as evidence in lawsuits We can now broadcast our thoughts, opinions, images and videos instantly through a vast array of social-networking sites such as Facebook, LinkedIn and Twitter. These sites invite users to share personal details in order to network, find romance or just have fun. Blogs, podcasts and YouTube videos also allow users to disseminate their views. In the last few years, social-networking activity has soared, surpassing use. In fact, most such activity now occurs during business hours — but mostly not for business purposes. Unfortunately, social networking can lead to many types of business and/or legal issues. For example, you may be tempted to post confidential, proprietary or sensitive information, or to air grievances, about our organization or another employee. Whether they originate on our computer network or your home computer, such posts could damage our reputation and expose both you and our organization to legal action, including civil and criminal penalties. And under the law, posts to social-networking sites are potentially "electronically stored information" that could be used as evidence in a lawsuit. 8 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

11 Appropriate Internet Use
11/21/2019 Social Networking (Cont’d) Limit your social-networking activity at work to personal or break time Never — Post negative or disparaging comments about our organization Speak for our organization Use our logo or other intellectual property Use our computer network for any prohibited communications Think before your post, tweet or click! To the extent it is not directly work-related, limit your social-networking activity at work to personal or break time. Always use a respectful, professional tone in your posts. Never — Post negative or disparaging comments about our organization, a co-worker, customer or anyone else. Speak for our organization or purport to represent our views in any way. Use our logo or other intellectual property, or post, use or refer to any confidential or proprietary information relating to our organization. Use our computer network for any social-networking activities involving any communications that we prohibit. Think before your post, tweet or click. With so-called "Web 2.0" technology, it's all too easy to post or send something embarrassing, damaging or even illegal. And once it's on the Web, you may never be able to retract it fully. Negative or Disparaging Comments Negative or disparaging comments may breach your duty of loyalty to the organization and may result in disciplinary action, up to and including termination. 9 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

12 Appropriate Internet Use
11/21/2019 Pop Quiz! Assuming that this is an employee’s personal blog, which of the following statements is the most accurate: A. Since this is not a company blog, the author’s entry cannot be the basis for any legal liability or adverse employment consequences. B. This entry could implicate the company in a violation of the Americans with Disabilities Act. This entry illustrates an employee’s conflict of interest. This entry could get the employee fired even though it doesn’t violate a specific law or company policy. Answers: A., B. and C. This is incorrect. A blog entry similar to this led to the firing of an employee of a software company. There are many similar cases where employees have been fired for personal blog entries (some including photographs) that were critical of their company or that could have led to public embarrassment of the company for some reason. D. This is correct. A blog entry similar to this led to the firing of an employee of a software company. There are many similar cases where employees have been fired for personal blog entries (some including photographs) that were critical of their company or that could have led to public embarrassment of the company for some reason. 10 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

13 Appropriate Internet Use
11/21/2019 Inappropriate Communications We strictly prohibit — Sending anything that would violate discrimination and harassment laws Communicating in a way that would compromise confidentiality or violate any laws Soliciting for ventures unrelated to our business Transmitting any material you are not authorized to access Retaining messages that were misaddressed or sent inadvertently Sending communications that attempt to hide your identity We strictly prohibit all of the following activities: Sending information, images, videos, etc., that are threatening, sexually explicit or would otherwise violate discrimination and harassment laws; Communicating in a way that would compromise confidentiality or violate laws such as those regarding insider trading, antitrust or defamation; Soliciting for ventures unrelated to our business without prior authorization; Transmitting, uploading or downloading any material you are not authorized to access; Retaining messages that were misaddressed or sent to you inadvertently; and Sending communications that attempt to hide the identity of the sender or represent the sender as someone else. Discrimination and Harassment Laws In the U.S., federal law prohibits discrimination based on race, color, sex, age, religion, pregnancy, national origin, disability, veteran status and genetic information. Many U.S. states also prohibit discrimination based on sexual orientation, gender identity and marital/familial status. Local and state laws prohibit a variety of other forms of discrimination. 11 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

14 Appropriate Internet Use
11/21/2019 Pop Quiz! Which of the following statements is the most accurate: A. Because instant messages are generally not saved on the participants’ computers, they cannot be the basis for any legal liability. B. This exchange illustrates a violation of privacy by “Fam45” against “Page 16”. C. This entry could get “Fam45” fired even though it doesn’t violate a specific law or company policy. D. If “Page16” works with and reports to “Fam45”, this exchange is an example of quid pro quo sexual harassment by “Fam45”. Answers: A., B. & D. This is incorrect. This is an example of the exchange of instant messages between a U.S. congressman and an underage congressional page. The congressman resigned shortly after the IMs became public knowledge. More commonly, employees have subjected themselves and their companies to potential legal liability by using IM technology to transfer copyrighted MP3 files, photos, movies and software to bypass filters and file-size restrictions of corporate systems. C. This is correct. This is an example of the exchange of instant messages between a U.S. congressman and an underage congressional page. The congressman resigned shortly after the IMs became public knowledge. More commonly, employees have subjected themselves and their companies to potential legal liability by using IM technology to transfer copyrighted MP3 files, photos, movies and software to bypass filters and file-size restrictions of corporate systems. 12 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

15 Appropriate Internet Use
11/21/2019 Prohibited Internet Use We also prohibit — Accessing pornographic sites Accessing information that you're not authorized to access "Hacking" into computer systems Excessive non-work-related use Downloading files without authorization Conducting job searches Anything that could incur liability for copyright infringement, defamation, insider trading, workplace discrimination, or other unlawful conduct We also prohibit the following activities while using our network and/or electronic communication systems: Accessing pornographic sites; Accessing information that you're not authorized to access; "Hacking" into our or others' computer systems; Excessive non-work-related use (games, videos, chatrooms, etc.); Downloading executable or other files without authorization; Conducting job searches; and Anything that could incur liability for copyright infringement, defamation, insider trading, workplace discrimination, or other unlawful conduct. Unauthorized Software We own or license all software used with our electronic-communication systems. You may not copy any of this software for personal use or for use on non-work-issued computers or other systems without authorization from the IT Department. In addition, you may not install your own software on our computers or systems without the authorization of the IT Department. If unlicensed or personal software is found on one of your work-issued computers or handheld devices that was installed without authorization, it may be removed without notice, and we will not be responsible for any loss or damage caused by such removal. 13 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

16 Appropriate Internet Use
11/21/2019 Passwords Memorize your passwords and change them periodically Don't write down or share your passwords with anyone You are responsible for all messages, files and other data created, edited or sent under your password Don't leave your computer or device unattended without password protection Notify the IT department promptly if your computer or device is lost or stolen Be on the lookout for social engineering You should memorize your passwords and change them periodically. Passwords should be difficult for others to recognize, but have enough significance for you such that you won't forget them. Never write down or share your passwords with anyone else. If you accidentally disclose your password to an unauthorized person, change it immediately and report the incident to the IT Department. Once you "log on" to our computer network or other electronic-communication systems with your password, you are responsible for all messages, files and other data created, edited or sent under that password. Accordingly, you should be careful not to leave your computer or handheld device unattended for an extended time without password protection. If a computer or handheld device that you have used for your work is lost or stolen, notify the IT department promptly. Be on the lookout for ways that individuals may try to obtain your username and password under false pretenses through social engineering. 14 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

17 Appropriate Internet Use
11/21/2019 Passwords (Cont’d) Memorize your passwords and change them periodically Don't write down or share your passwords with anyone You are responsible for all messages, files and other data created, edited or sent under your password Don't leave your computer or device unattended without password protection Notify the IT department promptly if your computer or device is lost or stolen Be on the lookout for social engineering Social Engineering Social engineering generally refers to a number of low-tech ways to attempt to gain unauthorized entry into a computer system. Here are a few examples of the techniques that unauthorized individuals use: Impersonating an authorized person online, by telephone, or even in person; Coaxing information such as passwords out of employees by preying on their trust, charming them or flirting; Rigging the system and then offering to help "fix it" — and accessing passwords in the course of repairing the system they've rigged; Entering the work area and looking over people's shoulders to find out passwords; Sifting through unshredded documents in the trash; and Offering a sweepstakes requiring a password to enter, with the hope that the participant will use the same password he/she uses to access the company network. 15 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

18 Appropriate Internet Use
11/21/2019 Working Remotely Working remotely involves added responsibilities: To use our e-communications systems safely and securely Keep our organization in compliance with all applicable data- privacy laws These responsibilities apply at home, in the office or on the go All computers and handheld devices must be password- protected and approved by IT Department before you may use them for work Non-exempt employees must record all time spent on work- related matters, whether inside or outside the workplace With laptops, PDAs, "cloud computing" and the like, many employees can work productively wherever and whenever they want. But with this added convenience comes added responsibility — to use our electronic-communications systems safely and securely, and thus keep our organization in compliance with all applicable data-privacy laws. This responsibility applies whenever you use our electronic-communication systems, whether at home, in the office or on the go. If you use a handheld device for work, it must have all appropriate security capabilities enabled, just as with any work-issued desktop or laptop computer. All computers and handheld devices must be password-protected and approved by the IT Department before you may use them for work. In addition, if you are a non-exempt employee who works remotely at any time, you must record all of your time spent on work-related matters, whether inside or outside the workplace. 16 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

19 Appropriate Internet Use
11/21/2019 Working Remotely (Cont’d) Working remotely involves added responsibilities: To use our e-communications systems safely and securely Keep our organization in compliance with all applicable data- privacy laws These responsibilities apply at home, in the office or on the go All computers and handheld devices must be password- protected and approved by IT Department before you may use them for work Non-exempt employees must record all time spent on work- related matters, whether inside or outside the workplace Electronic-Communication Systems Our electronic-communication systems include any means by which information related to or handled by our organization is transmitted, processed or stored, regardless of the medium. Examples include — Cell or landline phones, including voic and text messages; and instant messages; Computer networks; Internet or intranet websites; Pagers; Modems; and Fax machines. 17 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

20 Appropriate Internet Use
11/21/2019 Pop Quiz! While on a business trip, Zoe left her PDA in a cab. She called the cab company, but they did not have it. The device was password- protected, so she decided to wait until she returned to the office to report it. Was this okay? A. Yes, because it could still be found by the cab company. B. Maybe, because it's password protected. C. No, if there's a way the device can be disabled remotely. Answers: A. and B. This is incorrect. Handheld devices can sometimes be disabled remotely, and that should be done immediately after a loss or theft is discovered. Since passwords are not foolproof, Zoe should report it right away. C. This is correct. Handheld devices can sometimes be disabled remotely, and that should be done immediately after a loss or theft is discovered. Since passwords are not foolproof, Zoe should report it right away. 18 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

21 Appropriate Internet Use
11/21/2019 Violations Employees who violate policies, rules or laws will be subject to discipline, up to and including discharge from employment Employees who make excessive personal use of e- communication systems may be responsible for costs Upon termination, employees must return all property issued for work purposes Employees who discover a violation of any rules have a duty to notify their supervisor or the IT Department as soon as possible Employees who violate any of the policies, rules or laws relating to use of our electronic-communication systems will be subject to discipline, up to and including discharge from employment. In addition, employees who make improper or excessive personal use of any of our electronic-communication systems may be required to reimburse us for the costs involved. Upon termination of employment, whether voluntary or involuntary, all employees must return all property that we issued for work purposes, including computer hardware, peripheral and portable devices and software. Failure to do so could subject an employee to civil and/or criminal prosecution for theft, misappropriation of trade secrets, etc. Finally, employees who discover a violation of any rules described in this course have a duty to notify their supervisor or the IT Department as soon as possible. 19 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

22 Appropriate Internet Use
11/21/2019 Final Quiz 20 of 20 Copyright © 2010 WeComply, Inc. All rights reserved.

23 Appropriate Internet Use
11/21/2019 About WeComply WeComply is a leading provider of customized ethics and compliance training solutions. We are committed to providing the best-of-breed training content, technology and customer service. Specializing in ethics and compliance training since 1999 60+ ethics and compliance training courses in 42 languages Content partners include the Association of Corporate Counsel (ACC), Proskauer Rose and White & Case 500+ clients of all sizes and in all industries 1-866-WeComply Note to Trainer: This slide may be removed Copyright © 2010 WeComply, Inc. All rights reserved.

24 Appropriate Internet Use
11/21/2019 Course-Delivery Options WeComply offers training courses in multiple delivery formats to reach all employees -- not just those with computers: 1-866-WeComply Online – available 24/7 from any computer Mobile – tablets and smartphones Offline options when Internet access is unavailable: PowerPoint with presenter notes for classroom training PDF booklets with tear-off certifications CD-ROM/intranet with tracking via Phone-based training and certification Note to Trainer: This slide may be removed Copyright © 2010 WeComply, Inc. All rights reserved.

25 Appropriate Internet Use
11/21/2019 Online Training Benefits While classroom training has certain advantages, it can be challenging to implement in large and/or geographically dispersed companies. Consider these advantages of online training: Better Attendance Higher Completion Rates Less Impact on Productivity Perfect for New Hires Convenient for Remote Locations Available in 42 Foreign Languages Easy Access to Courses Periodic Refreshers Blended Benefits Get the best of both worlds by providing classroom training where feasible and online training elsewhere – all centrally tracked and organized for easy monitoring and reporting. Note to Trainer: This slide may be removed Copyright © 2010 WeComply, Inc. All rights reserved.


Download ppt "Appropriate Internet Use"

Similar presentations


Ads by Google