of an email is a signature in the same way as a name written at the end of a letter;
(f) download or email text, music and other content on the internet subject to copyright protection, unless it is clear that the owner of such works allows this;
(g) send messages from another person's email address (unless authorised) or under an assumed name; or
(h) send confidential messages via email or the internet, or by other means of external communication which are known not to be secure.
4.6
If you receive an email in error you should inform the sender.
4.7
Do not use your own personal email account to send or receive email for the purposes of our business. Only use the email account we have provided for you.
5.
USING THE INTERNET
5.1
Internet access is provided solely for business purposes. Occasional personal use may be permitted as set out in paragraph 6.
5.2
When a website is visited, devices such as cookies, tags or web beacons may be employed to enable the site owner to identify and monitor visitors. If the website is of a kind described in paragraph 8.1, such a marker could be a source of embarrassment to the visitor and us, especially if inappropriate material has been accessed, downloaded, stored or forwarded from the website. Such actions may also, in certain circumstances, amount to a criminal offence if, for example, the material is pornographic in nature. You should not access any web page or download any image, document or other file from the internet which could be regarded as illegal, offensive, in bad taste or immoral. Even web content which is legal in the UK may be in sufficient bad taste to fall within this prohibition. As a general rule, if any person (whether intended to view the page or not) might be offended by the contents of a page, or if the fact that our software has accessed the page or file might be a source of embarrassment if made public, then viewing it will be a breach of this policy. You should not under any circumstances use our systems to participate in any internet chat room, post messages on any internet message board or set up or log text or information on a blog or wiki, even in your own time. The following must never be accessed from our network: online radio, audio and video streaming, instant messaging and webmail (such as such as Gmail or Hotmail) and social networking sites (such as Facebook, Twitter, Bebo, YouTube, Second Life). This list may be modified from time to time.
5.3
5.4
5.5
6.
PERSONAL USE OF OUR SYSTEMS
6.1
We permit the incidental use of our internet, email and telephone systems to send personal email, browse the internet and make personal telephone calls subject to certain conditions set out below. Personal use is a privilege and not a right. It must not be overused or abused. We may withdraw permission for it at any time or restrict access at our discretion.
6.2
Personal use must meet the following conditions:
(a) use must be minimal and take place substantially out of normal working hours (that is, during lunch hours, before 9 am or after 5. pm);
(b) personal emails should be labelled "personal" in the subject header;
151
Made with FlippingBook - Online magazine maker