make your free communications and equipment policy

what we'll cover
what is a communications and equipment policy?
a communications and equipment policy is an internal policy that governs the use of it resources and electronic communication systems within the workplace. communications and equipment policies set out the extent to which the use of it resources is permitted at work, in particular the use of pcs and laptops, internet, emails, software and passwords.
this document is gdpr compliant.
when should i use a communications and equipment policy?
use this communications and equipment policy:
-
if you are a business employing staff
-
to explain the rules and procedures to follow when using communications and other it resources while at work
sample communications and equipment policy
the terms in your document will update based on the information you provide
communications and use of equipment policy
statement of policy and purpose of policy
- (the employer) provides staff with access to a range of communications and information technology equipment and systems (resources) both as a shared resource in the workplace and also through individual allocation of items for use inside or outside the workplace. it is our aim and responsibility to:
- provide you with all the resources necessary for the proper performance of your duties, in a reasonable and economical manner;
- ensure the security of resources against unauthorised access or abuse whilst ensuring their accessibility to authorised and legitimate users.
- the purpose of this document is to explain to staff the standards we require them to observe in using our resources and the consequences of not adhering to these as well as to explain our policy in respect of monitoring use of our resources.
- this is a statement of policy only and does not form part of your contract of employment. we may amend this policy at any time, in our absolute discretion.
who and what does this policy cover?
- this policy and the rules contained in it apply to:
- all staff of the employer, irrespective of seniority, tenure and working hours, including all employees, directors and officers, consultants and contractors, casual or agency staff, trainees, homeworkers and fixed-term staff and any volunteers (staff); and
- all use of our resources including but not limited to use (and misuse) of computer servers and other hardware or equipment, desktop or portable computers, laptops and mobile telephones, blackberries and other smartphones or personal digital assistants (pdas), networks and systems, software, applications, subscriptions to databases and electronic resources, fax machines, scanners, printers, memory or storage devices, copiers, cctv, and electronic keys, passes and cards, email, the internet and any data sent from, received by, or stored on our computer or communications equipment or systems.
- the has overall responsibility for this policy and has appointed the as the person with day-to-day responsibility for the employer's resources.
- all staff have personal responsibility to use our resources in a professional, ethical and lawful way and ensure compliance with this policy. you are expected to protect our resources from unauthorised use or access at all times. managers have special responsibility for leading by example and monitoring and enforcing compliance.
- any breach of this policy will be taken seriously and may result in disciplinary action.
personal use of resources
- our resources are provided to support staff in the proper performance of their duties.
guidelines for pc and laptop use
- each employee has responsibility for the appropriate use and day-to-day care of their office computer workstation and any computer equipment provided for use on or off our premises.
- you may not connect personal equipment or peripherals, for example, flash memory cards and sticks, mp3 players or digital cameras, to our resources unless this has been authorised in advance by the .
- you will log on to your computer using an individual username and password. you must not log on to any computer using someone else's name and password or otherwise use our resources in a way that would lead us to believe that your activities are somebody else's, unless this has been approved in advance by the even if you have the consent of the individual concerned.
- do not leave your computer accessible to others when you are not at your computer. lock your screen or logout whenever you are away from your computer for more than a few minutes.
using resources outside work
- if you are given authorisation to use any resources away from our premises, including at home, (remote resources) then you must take appropriate care of any equipment provided to use, ensure it is well-maintained and used in accordance with our rules, including this policy and with specific instructions given to you by the . we may inspect remote resources without prior notice and, if asked, you must immediately return any equipment to us for inspection or maintenance.
- remote resources provided to you are your responsibility. you must take reasonable steps to ensure the security of any equipment provided to you for use outside the workplace. if you are transporting equipment by car, it should be locked and left out of sight when the vehicle is unattended (e.g. in the boot of a car).
- we provide equipment and other resources for use outside the workplace in our absolute discretion and may withdraw this entitlement at any time. you must immediately return any resources to us if we ask you to and, in any case, when your employment ends.
email guidelines
- email is an efficient and cost-effective means of communication and we encourage its appropriate use for business-related purposes. however, inappropriate or negligent use of email carries significant risks.
- your communications by email, like all other modes of communication, must not breach our disciplinary or workplace rules or any other policy and procedure and must not cause us to be in breach of obligations we owe to others. see the misuse of resources section of this policy, below, for further information.
- confidentiality is a particular concern when using email. you must be careful in addressing messages to make sure that communications are not inadvertently sent to unintended recipients. in addition, although we take steps to protect data security, you should be aware that the confidentiality of data (including email messages) sent via the internet cannot be assured. you should only send price-sensitive or commercially sensitive information belonging to or relating to us with the prior authority of the
- delivery of email cannot be guaranteed. if your email is urgent or important, check that it has arrived safely with the intended recipient.
- in general, you should not:
- distribute chain mail, junk mail, jokes or gossip, trivial or unnecessary messages; or
- agree to terms, enter into contractual commitments or make representations by email unless you are authorised to do so.
- if you are sent an email in error you should delete it and notify the sender. you should not disclose or use any confidential information it contains.
- bear in mind that viruses may lurk in attachments or links sent by email. while we take measures to protect against viruses, do not open emails or attachments or click on links unless they are from a source that you know and trust. if you see any virus alert or notification on your computer, contact the immediately.
- in using email, you should observe the standards for communication that we expect for other forms of writing, including as to style, content and choice of language.
- always consider whether there is a more suitable method of communication, for example, where there is a need to preserve confidentiality or in the case of sensitive issues which should be communicated face to face.
- do not use your work email address to register or sign up for online services or otherwise to communicate with any provider of goods or services, since this is likely to increase the amount of spam email that we receive as a business.
- you must comply with any guidelines that we issue concerning filing, archiving and deletion of emails.
- if you are out of the office on a working day you must create an automated "out of office" message to alert correspondents to your absence and the arrangements for dealing with any urgent queries.
guidelines for internet use
- when using the internet, remember that each website that you visit has the ability to detect information about you, including our identity as an organization and, potentially, your identity and who you are, and whom you represent. the information that you input on a website may be accessed by third parties, anywhere in the world. accordingly, judgement and discretion should be used in determining the websites that you choose to access and your activities on that site.
- you must read and comply with the terms and conditions of any website that you access using our resources.
- you must not:
- disable, alter settings on or interfere in any way with any measures implemented by us to ensure the security of resources and/or avoid computer viruses in connection with internet use, including our firewall arrangements;
- visit any gambling, gaming, adult or other inappropriate website, including any website that is offensive, insulting, discriminatory or obscene or is likely to damage your reputation or our reputation;
- use illegal file-sharing websites;
- download any program, data, game or other material from the internet except with the prior approval of the , because of the prevalence of viruses on the internet.
guidelines for software use
- most of the software and applications we use are licensed from third parties and our use is subject to terms and conditions. you must always comply with the terms of any software licence we hold. you must not copy, download or install any software or application except with the prior approval of the .
- if any computer, phone, blackberry or other hardware we have provided to you prompts you to update or renew any software or application licensed to us, then you must do so promptly, unless we have told you not to.
- only software or applications provided or authorized by the may be installed on our resources including but not limited to on your desk computer or laptop and any remote resources. you may not install other computer games, internet files, software, applications or other programmes on our resources.
monitoring of use of our resources
- we may monitor and intercept your use of our resources, including your internet use and communications sent to you or received by you, by phone, email (including associated files or attachments), fax or any other means, involving our resources for a number of relevant business reasons, including but not limited to:
- ensuring compliance with the terms of this policy;
- training and monitoring standards of service;
- ensuring compliance with regulatory practices or procedures imposed or recommended by any regulatory body relevant to our business;
- ascertaining whether internal or external communications are relevant to our business;
- preventing, investigating or detecting unauthorised use of our it systems or criminal activities;
- maintaining the effective operation of our resources - in particular, all emails received by the employer are automatically scanned for viruses;
- establishing the existence of facts.
- certain authorised employees involved in administering our resources may necessarily have access to the contents of email messages in the course of their duties. any knowledge thus obtained should not be communicated to others, unless necessary for legitimate business reasons.
- we may also take any action in administering email or other communications that is reasonably necessary to preserve the integrity or functionality of our resources including as part of a firewall or spam or virus protection arrangements. this could include the deletion or non-transmission of any emails or communications (including any personal communications).
data protection
- monitoring of our resources use will be conducted in accordance with an impact assessment that we've carried out to ensure that monitoring is necessary and proportionate. monitoring our resources is in our legitimate interests and ensures this policy is being complied with. for the purposes of the law on data protection, the employer is a data controller of the personal information in connection with your employment. this means that we determine the purposes for which, and the manner in which, your personal information is processed. the person responsible for data protection compliance is .
- monitoring will normally be carried out by our .
- information obtained through monitoring may be shared internally, including with members of the hr team, your line manager, managers in the business area in which you work and it staff, if access to the information is necessary for performance of their roles. information is only shared internally if we have reasonable grounds to believe that there has been a breach of this policy. we will not share information gathered from monitoring with third parties, unless we have a duty to report matters to a regulatory authority or law enforcement agency.
- you have a number of rights in relation to your personal information, including the right to make a subject access request and the right to have your information rectified or erased in some circumstances. you can find out more about these rights and how to access them in our data protection policy, which you can find here: . if you believe that we have not complied with your data protection rights, you can complain to the information commissioner.
password policy
- appropriate passwords are vital to maintaining the security of our resources.
- in general, to access certain resources such as computers, mobile phones or other devices or certain information sources or accounts, it will be necessary to enter a password or personal identification code. passwords should be kept private and are the direct responsibility of the person to whom the account or device is allocated. where access to any device or equipment that we provide to you can be secured by a password or code, you must use that facility.
password standards
- passwords used on our resources should adhere to the following standards, where permitted by the device or account in question:
- they must contain at least characters in total.
- they should not be a dictionary word in any language, slang, dialect, jargon, etc.
- they should not be based on readily available information about you like your date of birth, spouse's or child's name, telephone numbers or address.
- they should not be the same as or contain your name or username.
- you must not use the same password on our resources as you do for your personal accounts or devices.
- they must differ materially from previous passwords.
password security
- you are personally responsible for maintaining the security of your passwords used on our resources. you must not disclose your password to anyone else, inside or outside the employer, except as directed by the . you may not keep a written record of your passwords anywhere on our premises or any device unless it has been encrypted.
- you must not attempt to access any restricted area of our resources or to guess or determine the password of any other user.
- you must change your main computer login password when prompted to do so either automatically or by the .
- if you become aware or suspect that your password has become known to another person then you must immediately change it and notify the of the situation.
- on termination of your employment, however arising, or if requested to do so by the , you must provide details of all passwords used on our resources to the .
misuse of resources
- the same principles apply to your use of resources for communication including through email, telephone and the internet as apply to any means of communication and you must not use these for any purpose or in any way which could be subject to disciplinary or legal action in any other context. in particular, you must not use our resources in any way that:
- breaches obligations of confidentiality which you owe to us or to any third party or which causes us to breach duties of confidence which we owe to any third party.
- breaches the rights of any other staff member to privacy, data protection and confidentiality or which amounts to bullying or harassment;
- is offensive, insulting, immoral, discriminatory, obscene, pornographic or sexually explicit;
- poses a threat to our confidential information and intellectual property;
- infringes the intellectual property rights of any other person or entity;
- defames or disparages us or our associated companies or to any party with whom we have a business relationship, such as suppliers or customers;
- breaches or causes us to breach any law or the rules or guidelines of any regulatory authority relevant to our business;
- breaches data protection rules;
- breaches our rules, policies or procedures for the use of our it systems or other equipment or resources;
- is dishonest, improper, unethical or deceptive (eg pretending to be someone or attempting to access another employee's computer, computer account, email, files, or other data);
- is likely to damage your reputation or our reputation;
- wastes resources or use them excessively or to the exclusion of others;
- interferes with the work of others or our computer, technology or communications systems.
- further, you must not:
- delete, destroy or attempt to modify our resources or any information contained on them except in line with this policy or instructions given to you by the ;
- use our resources to conduct any business other than our business.
- you should also note that the following activities are criminal offences:
- unauthorised access to computer material (hacking); and
- unauthorised modification of computer material.
about communications and equipment policies
learn more about making your communications and equipment policy
-
how to make a communications and equipment policy
making a communications and equipment policy online is simple. just answer a few questions and 2022世界杯32强抽签时间 will build your document for you. when you have all of the details prepared in advance, making your document is a quick and easy process.
to make your communications and equipment policy you will need the following information:
employer details
-
what is the employer’s name?
-
who has overall responsibility for the policy?
-
the board of directors?
-
a committee? what is the name of the committee?
-
an individual? what is the individual’s job title?
-
-
what is the job title of the person with day-to-day responsibility for staff it resources?
it resources
-
does the employer want to list their it resources in this policy?
-
if so, what are the employer’s it resources?
-
-
are the employees allowed to make personal use of it resources?
-
should emails with sensitive business information be password protected or encrypted?
-
does the employer want to include a disclaimer on all business emails?
-
if so, what is the email disclaimer?
-
-
is cctv in use on the employer's premises?
-
if so, which areas are monitored by cctv?
-
policies
-
will this communications and equipment policy:
-
refer employees to the staff handbook for other policies relevant to the issues covered in this policy?
-
list other policies relevant to the issues covered in this policy?
-
neither of the above?
-
-
if other policies will be listed in the communications and equipment policy, do they include:
-
a media relations policy?
-
another policy?
requirements
-
what is the minimum number of characters required for passwords used in the employer's ict resources?
-
should passwords contain at least one:
-
uppercase character?
-
lowercase character?
-
symbol?
-
numeric character?
-
-
will employees need to change their computer log-in details regularly?
-
if so, how often should employees change their computer log-in details?
-
data protection and monitoring
-
who has overall responsibility for the employer's data protection compliance?
-
another individual? what is the individual’s job title?
-
who will carry out monitoring?
-
the security team?
-
another department? what is the name of the department?
-
-
will information gathered through monitoring be transferred outside of the uk or european economic area (eaa)?
-
what is the url of the employer’s data protection and data security policy?
-
-
common terms in a communications and equipment policy
a communications and equipment policy outlines the rules and procedures for the use of an employer’s communications and it equipment and resources. to achieve this, this policy covers:
statement of policy and purpose of policy
this section sets out why the employer has adopted the communications and equipment policy. it explains that this policy sets out the standards required of staff when using the employer’s resources and the consequences of non-compliance. it also clarifies that the policy does not form part of anyone’s employment contract and can, therefore, be changed at the employer’s discretion.
who and what does this policy cover?
this section details to whom the communications and equipment policy applies and what resources the policy covers. it also sets out who has overall and day-to-day responsibility for the policy.
personal use of resources
this section sets out whether staff members are allowed to make personal use of the employer’s resources and, if so, what restrictions apply.
guidelines for pc and laptop use
this section sets out the employer’s guidelines for the use of pcs and laptops by staff members.
using resources outside work
this section sets out the rules for using the employer’s resources outside of the workplace (eg when working from home).
email guidelines
this section details the employer’s guidelines for emails. this includes ensuring confidentiality and house style and safety considerations (eg avoiding viruses).
guidelines for internet use
this section sets out the employer’s guidelines for staff members’ use of the internet while at work.
guidelines for software use
this section sets out the employer’s guidelines for staff members’ use of software.
monitoring of use of our resources
this section details how the employer monitors their staff members’ use of resources. this includes the business reasons for monitoring (eg ensuring compliance with the terms of this policy, training and monitoring standards of service, and preventing, investigating or detecting unauthorised use of it systems).
data protection
this section sets out how the employer will process (eg use and store) employee personal data under this policy. it highlights that any data will be processed under the employer’s data protection and security policy and states whether or not data will be transferred internationally.
password policy
this section explains the employer’s password policy and clarifies that passwords are vital to maintaining the security of resources.
password standards
this section sets out the requirements that passwords for the employer’s resources must meet.
password security
this section sets out that staff members are responsible for ensuring the security of their passwords. this includes not sharing passwords with others and changing passwords when prompted to do so.
misuse of resources
this section sets out that staff members must not misuse the employer’s resources and provides examples of potential misuses (eg infringing on another’s intellectual property rights or breaching data protection obligations). it also clarifies the types of misuse that are considered criminal offences (ie hacking and unauthorised modification of computer material).
other relevant policies
this section is only included if the policy points staff members to other relevant policies - either by means of a staff handbook or by listing individual relevant policies. this section provides details on the other policies that are relevant to this policy.
if you want your communications and equipment policy to include further or more detailed provisions, you can edit your document. however, if you do this, you may want a lawyer to review or change the communications and equipment policy for you to ensure it complies with all relevant laws and meets your specific needs. ask a lawyer for assistance.
-
legal tips for making a communications and equipment policy
consider what other policies you should adopt
there are various employment policies that you should consider making and implementing as an employer. however, the most important policy for anyone making a communications and equipment policy is a data protection and security policy, which sets out how you process (eg handle and store) personal data (eg employees’ names and addresses). this document is crucial to demonstrate your data protection compliance.
you should also consider adopting:
-
a social media policy - outlining the rules for staff members’ use of social media at work
-
an anti-bullying and harassment policy - outlining how you handle workplace bullying and harassment
for more information on different employment policies, read hr policies and procedures.
understand when to seek advice from a lawyer
-
for help changing an existing policy that is contractually binding
-
where allegations of breach of privacy arise in connection with employees' use of communications and other it resources
-
if this communications and equipment policy doesn’t meet your needs.
-
communications and equipment policy faqs
-
what is included in a communications and equipment policy?
this communications and equipment policy template covers:
-
the extent to which the use of communications and other it resources is permitted while at work
-
limits and guidance on the use of communications and other it resources
-
guidance on the types of legal issues arising from the use of communications and other it resources including confidentiality, intellectual property infringement, defamation and bullying and harassment
-
password guidance and instructions
-
guidance on the use of email including archiving, disclaimers and confidentiality issues
-
guidance on internet use
-
rules about using communications and other it resources provided for use outside the workplace, such as laptops and personal digital assistants (pdas)
-
prohibited uses of communications and other it resources
-
monitoring of use of communications and other it resources
-
the consequences of breaching the policy
-
-
why do i need a communications and equipment policy?
having a communications and equipment policy ensures employees are aware of, and comply with, the rules regarding the use of it resources and communications systems while they are at work.
by clearly outlining the rules and procedures regarding access to communications and it equipment and resources to your managers and staff, you ensure that everyone understands the employer’s it processes and procedures. employees will need to know the extent to which using such communications equipment and resources is permitted at work and the consequences of breaching a communications and equipment policy, as well as the rules allowing the employer to monitor equipment use. a communications and equipment policy not only provides clear guidelines for all staff members, it also protects the employer.
this communications and equipment policy also grants the security of communications and other it resources against unauthorised access or abuse, while ensuring their accessibility to authorised staff.
for more information, read employee use of it.
-
to what extent should the use of it resources be permitted at work?
there is no obligation to allow staff to use it equipment for their personal purposes. this policy makes clear that when personal use is allowed, it must be lawful and reasonable and must not interfere with the staff member's productivity or duties.
for more information, read employee use of it.
-
what are the prohibited uses of communications and other it resources?
under this communications and equipment policy, staff must not:
-
alter settings on or interfere with any measures implemented by the employer
-
visit any gambling, gaming, adult or otherwise inappropriate website that is offensive, insulting, discriminatory or obscene
-
download any images, files or other data that’s unrelated to business purposes which could be regarded as pornographic, illegal, criminal, offensive or obscene
-
engage in computer hacking.
-
-
can employers monitor their employees’ use of it resources at work?
employers can monitor staff members’ workplace use of it as long as their monitoring is justified. where monitoring is justified, employers have the right to monitor and intercept the staff members' use of it resources, including internet use and any communications sent or received. for more information, read workplace monitoring.
however, monitoring of communications such as emails, internet use and phone calls engages data protection and privacy issues. for more information, read data protection and employees.
-
who does this communications and equipment policy apply to?
this communications and equipment policy applies to all staff members. this includes the employer’s employees, consultants, workers, fixed-term staff and volunteers.

our quality guarantee
we guarantee our service is safe and secure, and that properly signed 2022世界杯32强抽签时间 documents are legally enforceable under uk laws.
need help? no problem!
ask a question for free or get affordable legal advice from our lawyer.