Devon Cricket Board - E-Policy
Devon Cricket Board Policy on the Use of Social Media
The Board’s policy on use of social networking through the use of Internet-based and other electronic social media tools is integrated into everyday life. Use of Facebook, LinkedIn, Twitter, blogging, wikis and other online social media vehicles are commonplace. This policy is intended to provide guidance to eliminate any confusion concerning the use of social media. This policy outlines the standards the Board requires users of these systems to observe, the circumstances in which we will monitor use of these systems and the action we will take in respect of breaches of these standards.
This policy does not form part of any employee's contract of employment and it may be amended at any time.
This policy covers all individuals working at all levels and grades, including officers, directors, employees, consultants, contractors, trainees, homeworkers, part-time and fixed-term employees, casual and agency staff and volunteers (collectively referred to as staff in this policy).
Staff must not bring The Board or any of its clients into disrepute by virtue of their conduct. Such conduct may include (but is not exhaustive to) making comments about the Board or its’ clients which may be regarded as negative or derogatory in the public domain. For example, on blogs or social networking sites, such as Facebook, My Space or Twitter.
The lines between work and personal life can become blurred. In general, what you do on your own time is a personal decision. However, activities in or outside of work that affect your job performance, the performance of others, or the Board’s business interests.
Keep in mind the following when using social networking sites:
· The Board does not encourage contact on social networking sites with the minors they coach or their parents or guardians.
· Respecting differences, appreciating the diversity of opinions and speaking or conducting yourself in a professional manner is expected at all times.
· Use common sense. You should refrain from posting items that could reflect negatively on the Board or otherwise embarrass the Board, including comments or other posts about drug or alcohol abuse, profanity, off-colour or sexual humour, and other inappropriate conduct. Don't use ethnic slurs, personal insults, obscenity, or engage in any conduct that would not otherwise be acceptable in at the Board’s workplace.
· Show proper respect for people’s privacy and for topics that may be considered objectionable or inflammatory, like politics and religion.
· Respect the law, including those laws governing defamation, discrimination, harassment, and copyright and fair use.
· Don’t use the Board’s logo, unless specifically authorised to do so.
· Don’t disclose the Board’s (or anyone else’s) confidential or other proprietary information, such as current or anticipated products, software, research, inventions, processes, techniques, designs, or other technical data. Get permission from the owner prior to sharing or publishing their intellectual property. Ask permission to publish or report on meetings or conversations that are meant to be internal to the Board.
· Don't reference the Board staff or members without their approval.
· If you publish content to any website outside of the Board and it has something to do with work you do or subjects associated with the Board, use a disclaimer such as this: "The postings on this site are my own and don't necessarily represent the Board’s positions, strategies, or opinions.” If what you are publishing is, in fact, official business of the Board be sure that that you are authorised to make such statements on behalf of the organisation. If there is any doubt, check with your line manager.
· Ensure that your social networking conduct is consistent with the all policies contained in the Board’s Staff Handbook, including Equal Opportunities and Harassment Policy.
· Make sure that your online activities do not interfere with your job performance.
· You should at all times act with the high standard that is expected due to your professional status and maintain proper relationships with the people you come across in the course of your employment.
Devon Cricket Board IT, E Mail & Internet Usage Policy
The computer systems of the Board represent the heart of our ability to provide services to our clients. Protecting them is essential for the business to succeed. Therefore, the Board will take all the steps necessary to safeguard these systems and each employee should see it as a fundamental part of their job to help. This includes avoiding risks such as introducing unauthorised software, complying with copyright and Data Protection law, and being careful to protect the security of sensitive information.
This document outlines the procedures and employee responsibilities when accessing the Internet, sending & receiving emails and using the Board’s computer systems.
The Board views misuse of computers as serious misconduct which could, depending on the circumstances, result in dismissal.
Misuse amounting to criminal conduct will be reported to the relevant authorities.
1.1. Only Board approved and licensed software, and approved data are allowed on the Board’s computers. Removal of all unauthorised software is required. If unauthorised software is found on a system, the software will be deleted immediately and without question, including all associated data files.
1.2. Internet access and email equipment are the property of the Board.
1.3. Email messages that are created, sent or received using the Board equipment are the property of the Board
1.4. The Board reserves the right to record and disclose all web sites visited using its equipment.
2.1 Employees are only allowed access to those parts of the computer system which they need to carry out their normal duties.
2.2 Employees must comply with local procedures to ensure that all software introduced is virus-free.
2.3 Should employees have access to personal data, they must bear in mind at all times the provisions of the Data Protection Act.
2.4 Employees must observe the Computer Misuse Act 1990, in connection with both the Firm and third parties.
2.5 Passwords must be used at all times and changed regularly; avoidance of obvious passwords is recommended.
2.6 Employees are responsible for the security of their own passwords and workstations.
2.7 Employees must not purchase, install or use unlicensed software on Board or customer equipment.
2.8 Computer game playing is not permitted whilst in a work environment.
2.9 The downloading, transmission or storage (including streaming) of music or video for personal use in strictly prohibited.
2.10 Use of any Boards systems including email and the internet to conduct private or freelance business for the purpose of commercial gain is never acceptable.
2.11 To ensure compliance with this policy and the attainments of the policy objectives both private and business use of e-mail may be subject to monitoring.
3. E Mails
E mail Conduct – General
3.1. Employees may use the e-mail system for modest personal use outside working hours, however it should be kept to a reasonable level. Inappropriate or excessive use of the email system for personal reasons may result in disciplinary action and/or removal of the facility.
3.2. Global or site e-mails should not be used for personal issues which are non work related at any time.
3.3. The Board retains the right of access to and ownership of all email sent from and received by its systems.
3.4. E-mail is an excellent tool for imparting information in an informal and friendly manner. However because of the relative informality of email it is sometimes used without due consideration as to how it will be received.
3.5. Never send an email in haste or anger – once the ‘send’ button has been pressed an employee will not be able to stop the message being received.
3.6. E-mail messages should be treated as permanent written records which may be read by other people and which could result in personal or Board liability
3.7. The points below should help you in making the decision to send.
Before sending an email you should consider:
1.8 If the content and the purpose of the e-mail is really necessary. Face to face talking is always the best option if there is a problem to resolve.
1.9 Email should not be used as a substitute for interaction with colleagues.
1.10 The content and tone of the email. Do not type anything would not be acceptable to say directly to the recipient in person. E-mail is faceless and can be misinterpreted.
1.11 If the message may contain content that may be considered illegal, offensive or disruptive.
1.12 The ease and speed of e-mail can lead to inadequate thought going into a message, and the possibility of the words or tone being misinterpreted by the recipient.
1.13 Abrupt, inappropriate and unthinking use of language can lead to a bullying tone and possible offence to others, even harassment, for example, capitals are often interpreted as shouting.
Employees should not:
1.14 Assume because an email has been sent that they are absolved from responsibility for resolving the problem and further action is unnecessary.
1.15 Retrieve or read email messages that were not sent to them unless authorised by the board or by the email recipient.
1.16 Impersonate any other person when using email
1.17 Amend any received emails prior to storing, printing or forwarding them.
1.18 Use email to send defamatory messages that criticise other individuals or organisations.
1.19 Send or distribute e-mail messages which are abusive, defamatory, pornographic in nature or make any improper or discriminatory reference to a person.
1.20 Copy, download or forward to third parties, via e-mail, the work of other people protected under copyright, without their consent.
1.21 Remove or change the email disclaimer that is automatically attached to all outgoing messages.
1.22 Enter into contractual commitments by email
1.23 Create email congestion by sending trivial messages. It is strictly forbidden for anyone to copy/forward e mails such as chain mail letters, humorous stories, etc., or large attachments.
1.24 Send bank account or credit card information over the Internet.
Before using the CC Function Employees should:
1.25 Consider who really needs to receive a copy of an E-mail. Reduce the number of “cc” copies to send on a need to know basis.
1.26 Not copy an email as a political statement or to put pressure on the recipient.
1.27 Consider address groups set up in your e-mail personal address book. Whilst these are quick way of copying everyone in on the same message, employees should be aware that all recipients of the e-mail are able to see all the other names of those to whom the message was sent. This might not always be desirable – the obvious example is e-mailing a group of customers/clients or suppliers where we don’t want to give information about other customers/clients we are dealing with. Using the “blind copy” function is not a solution to this problem, as the server receiving the e-mail may convert into “cc’s” and so again all addresses names are displayed. The only solution is to avoid using these address groups (or sending the e-mail to more than one person) when the addressee list sent with the mail could be viewed with interest by one of the receiving parties.
External E mails.
1.28 All email communication must be handled in the same manner as a letter, fax, memo or other business communication. Employees should not send any information or write in any style that would be inappropriate to write on headed paper as an official board communication.
1.29 No copyrighted or board propriety information is to be distributed by board email or via the Internet unless approval has been granted by a board official.
Jokes sent via Email
1.30 It takes only seconds for a joke to be circulated by email. What may be amusing for one employee could be insulting to another.
1.31 Email communications are capable of amounting to harassment giving rise to a claim of discrimination on the grounds of sex, race (nationality), religious belief, sexual orientation, age or disability. In these circumstances a claim could be made against the individual who sent or forwarded the email and against the Board.
1.32 It is unacceptable to use email to circulate discriminatory or harassing statements. Should emails be circulated with content which could or does cause offence to any individual the disciplinary procedure will be invoked and such action may be consider gross misconduct.
1.33 Incidental and occasional personal use of email is permitted. Such messages become the property of the company and are subject to the same conditions as Board email messages.
Virus checking of email attachments
1.34 Virus checking software is pre-loaded on all computer equipment provided by the Board, this in turn will automatically check and, where possible, repair or delete any file attached to an email message that contains a computer virus.
1.35 However due to the constant creation of viruses by parties outside the control of the board, it is the responsibility of the employee to inform the appropriate Board official of any emails received (with file attachments) sent by an unknown and/or untrusted source prior to opening the file attachment.
1.36 It is also the responsibility of the recipient to ensure email attachments seem reasonable before opening them.
1.37 The Board reserves the right to block any emails that it deems to break any of the rules above.
4. Internet Usage
4.1 The use of the Internet for personal matters is permitted if the use is incidental, occasional and outside working time. Inappropriate or excessive use of the internet for personal reasons may result in disciplinary action and/or removal of the facility.
4.2 Internet sites browsed/visited must not contain content that may be considered illegal, offensive or disruptive.
4.3 Offensive content includes but is not limited to pornographic, obscene or harassing language or images, racial, ethnic, sexual or gender specific comments or images, or other comments or images that would offend someone on the basis of their religious or political beliefs, sexual orientation, national origin or age.
4.4 An employee must not distribute confidential, proprietary, and/or sensitive corporate information to external Internet sites or users without the appropriate authority.
4.5 Accessing or updating social networking sites (e.g. facebook or myspace), chat rooms or online blogs is not acceptable at any time.
4.6 The Board retains the right to block access to any Internet site they deem may contain inappropriate material.
External Internet Use
4.7 All employees should be conscious at all times of the information they place or way in which they portray the Board in any online forum.
4.8 Employees who post information on websites including (but not limited to); social networking sites, online blogs, open chat rooms and discussion groups outside of work, may be subject to disciplinary action and/or dismissal should that posting contain any confidential Board information or have the effect of bringing the Board into disrepute.
5.1 The Board recognises that employees have a legitimate expectation that they can keep their personal lives private and that they are also entitled to a degree of privacy in the work environment.
5.2 However the Board reserves the right to monitor employee email or internet activity where it is necessary to prevent or detect:
· Unauthorised use of the Board’s computer systems
· Any criminal activity including but not limited to fraud, harassment and obscenity
· Any detrimental impact upon the efficient operation of Boards systems
· Any breach of regulatory guidelines
· Excessive personal use of the internet or email-system.
· Any breach of this IT, E Mail & Internet Usage Policy or any other of the Board’s rules of procedure laid down in the contract of employment or the Board Handbook
5.3 All employees are hereby notified that the Board has the ability and legal right to monitor e-mail usage and internet usage. By using e-mail and internet the employee consents to any monitoring the Board considers justified to achieve one of the above aims or to protect any other legitimate interest.
5.4 When the monitoring of personal e-mails is necessary monitoring will be confined to the message address or heading.
5.5 Covert monitoring will only be performed in exceptional circumstances and only when sanctioned by a senior manager of the company.
5.6 If information gathered from monitoring may have an adverse impact on an employee, it will be presented to them and they will be allowed to make representations before any action is taken.
5.7 Information gathered through monitoring will only be used for the purpose for which the monitoring was carried out, unless the monitoring leads to the discovery of an activity that no employer could reasonably be expected to ignore.
5.8 All information gathered through monitoring will be held securely and kept for no longer than is necessary to achieve the aim for which it was collected.
6.1 All employee’s are under a duty to report the following to their line manager:
· suspect e mails/e mail attachments
· suspect web sites
· obscene/illegal material found on a PC or sent via email
· persistent use of the internet or e mail system for personal reasons
· persistent downloading of illegal/obscene/offensive material.
7. Breach of Policy
7.1 Staff will be liable to disciplinary action if they are in breach of this IT, E Mail & Internet Usage Policy.
7.2 Depending on the severity of the offence staff may be liable to summary dismissal.
7.3 If staff conduct and/or actions are unlawful or illegal the individual may be personally liable. Information relating to the commission of a criminal offence may be passed to the relevant prosecuting authority.
DAVID SHEPHERD TRUST
Sign up today to become a member
Help Youth Cricket in Devon
Handmade Cricket Bats in Devon
"We handcraft our bats using traditional tools and the highest grades of English willow in the heart of Devon. We also provide a high quality range of pads, gloves, wicket keeping and luggage for both adults and juniors."
Your advert to appear here
Click below to see how to place your advert here