Computer Use and Internet Policy

for Your State

This Computer Use and Internet Policy sets out a company's rule regarding their employees use of computers and the internet. It also sets out that the company has the right to monitor an employee's use of the internet.

File types included

  • Microsoft Word
  • Adobe PDF
  • WordPerfect
  • Rich Text Format

Compatible with

  • Windows
  • Mac OS X
  • Linux

For Immediate Download

$9.95 Add to Cart
Free eSignature included
with every order
Please select a state

Attorney prepared

Our forms are kept up-to-date and accurate by our lawyers

Unlike other sites, every document on FindLegalForms.com is prepared by an attorney, so you can be sure that you are getting a form that is accurate and valid in your state.

Valid in your state

Our forms are guaranteed
to be valid in your state

Our team works tirelessly to keep our products current. As the laws change in your state, so do our forms.

Over 3,500,000
satisfied customers

In over 10 years of creating and selling legal forms, our focus has never changed: providing our customers high quality legal products, low prices and an experience that takes some confusion out of the law.

Free eSignature

Sign your form online, free with any form purchase

We now provide a free Electronic Signature Service to all of our visitors. There are no hidden charges or subscription fees, it's just plain free.

60-Days Money Back

Try our forms with no risk

If you are unhappy with your form purchase for any reason at all, contact us within 60 days and we will refund 100% of your money back.
This Computer Use and Internet Policy sets forth a company's policy regarding use of a computer and the Internet by its employees and independent contractors. This policy contains the relevant definitions including the types of computer and telecommunication resources covered by the policy, definition of users and that the company has the right to monitor any and all aspects of its computer system. It also sets out that all users must comply with applicable laws regarding licenses and intellectual property, prohibited activities and uses and communication of the company trade secrets.

This Computer Use and Internet Policy includes the following provisions:
  • Policy Purpose: Sets out that the purpose is to ensure proper use of any office computer and telecommunication device by a company's employees or other computer users;
  • Compliance with Laws: Users must comply with all software license and copyrights in regard to online activity;
  • Prohibited Activities/Uses: Employees are prohibited from sending materials which are fraudulent, harassing or sexually explicit and may not be used for transmission of personal ads, solicitations or promotions;
  • Trade Secrets: Employees cannot send or receive proprietary information, unless expressly authorized;
  • Installation of Software: Users may not install software without first receiving consent from the system manager;
  • Signature: Employee must date and sign this policy.

Protect your rights and your company by using our attorney-prepared forms.

This attorney-prepared packet contains:
  1. General Information
  2. Instructions and Checklist
  3. Computer Use and Internet Policy
State Law Compliance: This form complies with the laws of all states
This is the content of the form and is provided for your convenience. It is not necessarily what the actual form looks like and does not include the information, instructions and other materials that come with the form you would purchase. An actual sample can also be viewed by clicking on the "Sample Form" near the top left of this page.













Computer Use and Internet Policy










This Packet Includes:
1.  General Information
2.  Instructions and Checklist
3.  Computer Use and Internet Policy









General Information
Computer Use and Internet Policy

This Computer Use and Internet Policy sets forth a company's policy regarding use of a computer and the Internet by its employees and independent contractors.  This policy contains the relevant definitions including the types of computer and telecommunication resources covered by the policy, definition of users and that the company has the right to monitor any and all aspects of its computer system.  It also sets out that all users must comply with applicable laws regarding licenses and intellectual property, prohibited activities and uses and communication of the company trade secrets.  

It is important that every company have a policy surrounding their employee's use of the Internet.  This Computer Use and Internet Policy clearly spells out all policies and procedures in place regarding an employee's use of a company computer and the Internet while on the job.

  





Instructions and Checklist


Computer Use and Internet Policy

   All company employees should carefully read the policy provisions.

   Insert all requested information in the spaces provided on the form.

     The "Prohibited Activities" and "Prohibited Uses" should be carefully read and understood by all employees.  If the wording of either provision is complicated, set forth specific examples to remove as much ambiguity as possible.  If there are disagreements or misunderstandings, they will likely focus on these provisions.

     This form contains the basic terms and language that should be included in similar agreements.  

     All company employees must sign and date this policy.

   The company and each employee should retain an original or copy of the signed policy.

   All legal documents should be kept in a safe location such as a fireproof safe or safe deposit box.  



   


DISCLAIMER:

FindLegalForms, Inc. (“FLF”) is not a law firm and does not provide legal advice. The use of these materials is not a substitute for legal advice. Only an attorney can provide legal advice.  An attorney should be consulted for all serious legal matters.  No Attorney-Client relationship is created by use of these materials.  
THESE MATERIALS ARE PROVIDED “AS-IS.  FLF DOES NOT GIVE ANY EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY, SUITABILITY OR COMPLETENESS FOR ANY OF THE MATERIALS FOR YOUR PARTICULAR NEEDS.  THE MATERIALS ARE USED AT YOUR OWN RISK.  IN NO EVENT WILL:  I) FLF, ITS AGENTS, PARTNERS, OR AFFILIATES; OR II) THE PROVIDERS, AUTHORS OR PUBLISHERS OF ITS MATERIALS, BE RESPONSIBLE OR LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATE OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER USED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THESE MATERIALS. 





COMPUTER USE AND INTERNET POLICY

Purpose

The purpose of this policy is to ensure the proper use of the computer and telecommunication resources and services of ______ (the "Company") by its employees, independent contractors, and other computer users.  All computer users have the responsibility to use the Company's computer resources in a professional, ethical, and lawful manner.

The following policies, rules, and conditions apply to all users of computer and telecommunication resources and services, wherever they are located within the Company.  Violations of this policy may result in disciplinary action, including possible termination of employment, legal action, and criminal liability.

Policy

The Company's computer and telecommunication resources include, but are not limited to, the following:  host computers, file servers, application servers, mail servers, fax servers, communications servers, workstations, stand alone computers, laptops, software, and internal or external computer and communications networks (including Electronic Data Interchange networks, Internet, commercial online services, bulletin board systems, and email systems) that are accessed directly or indirectly from the Company's computer facilities.

The term "Users", as used in this policy, refers to all employees, independent contractors, and other persons or entities accessing or using the Company's computer and telecommunications resources and services.

The Company has the right, but not the duty, to monitor any and all aspects of its computer system, including, but not limited to, monitoring sites visited by Users on the Internet, monitoring chat groups and news groups, reviewing material downloaded or uploaded by Users, and reviewing email sent and received by Users.

The computers and computer accounts given to Users are to assist them in the performance of their jobs.  Users should not have an expectation of privacy in anything they create, store, send, or receive on the Company's computer or telecommunications system.  The computer and telecommunications system belongs to the Company and may only be used for business purposes.

Users are governed by the following provisions, which apply to all uses of the Company's computer and telecommunications resources and services:

1.   Compliance With Applicable Laws and Licenses 

Users must comply with all software licenses and copyrights, and with all state, federal, and international laws governing intellectual property and online activities.


2.   Prohibited Activities 

Fraudulent, harassing, embarrassing, sexually explicit, obscene, intimidating, defamatory, or other unlawful or inappropriate material may not be sent by email or other forms of electronic communication (such as chat groups, bulletin boards, or news groups) or displayed on or stored in the Company's computers.  Users encountering or receiving such material should immediately report the incident to their supervisor.

3.   Prohibited Uses

Without prior written permission, the computer and telecommunications resources and services of the Company may not be used for the transmission or storage of commercial or personal advertisements, solicitations, promotions, destructive programs (that is, viruses or selfreplicating code), political material, or any other unauthorized use.

4.   Communicating Information 

Content of all communications should be accurate.  Users should use the same care in drafting email and other electronic documents as they would for any other written communication.  Anything created on the computer may, and likely will, be reviewed by others.

5.   Communication of Trade Secrets 

Unless expressly authorized by the User's supervisor, sending, receiving, or otherwise disseminating proprietary data, trade secrets, or other confidential information of the Company is strictly prohibited.  Unauthorized dissemination of this information may result in substantial civil liability as well as severe criminal penalties.

6.   Installation of Software; Virus Detection 

Users may not install software onto their individual computers or the network without first receiving express authorization to do so from the system manager.

Users may not install or use encryption software on any of the Company's computers without the express written consent of their supervisor.  Users may not use passwords or encryption keys that are unknown to their supervisors.

All material stored on floppy disk or other magnetic or optical medium and all material downloaded from the Internet or from computers or networks that do not belong to the Company MUST be scanned for viruses and other destructive programs before being placed onto the Company's computer system.

7.   Forwarding EMail 

Users may not forward email to any other person or entity without the express permission of the sender.
8.   Communications With Attorneys 

Email from or to inhouse counsel or an attorney representing the company must include a header identifying the message as an attorneyclient communication.

9.   Accessing Other Users' Files 

Users should not alter or copy a file belonging to another User without first obtaining permission from the owner of the file.  The ability to read, alter, or copy a file belonging to another User does not imply permission to read, alter, or copy that file.

10.   Responsibility for Passwords

Users are responsible for safeguarding their passwords for the computer system.  Individual passwords should not be printed, stored online, or given to others.  Users are responsible for all transactions made using their passwords.  No User may access the computer system using another User's password or account.  Users may not disguise their identities while using the computer system.

11.   Export Restrictions

Because of export restrictions, programs or files containing encryption technology are not to be placed on the Internet or transmitted in any way outside the United States without prior written authorization from ______.

12.   Waiver of Privacy

Users waive any right to privacy in anything they create, store, send, or receive on the Company's computers or the Internet.  Users consent to personnel of the Company accessing and reviewing all material Users create, store, send, or receive on the Company's computers or the Internet.

13.   Other Policies Applicable

Users shall observe and comply with all other policies and guidelines of the Company, including, but not limited to, ______.

14.   Disclaimer of Liability for Actions by Users

The Company is not responsible for the actions of individual Users in using the equipment and resources that are the subject of this policy.

15.   Disclaimer of Liability for Use of Internet

The Company is not responsible for material viewed or downloaded by Users from the Internet. Users are cautioned that the Internet is a worldwide network of computers that contains millions of pages of information.  Many of these pages include offensive, sexually explicit, and inappropriate material.  Users accessing the Internet do so at their own risk.

16.   Amendments and Revisions

This policy may be amended or revised from time to time as the need arises.

I have read, understand, and agree to comply with the foregoing policy, rules, and conditions governing the use of the Company's computer and telecommunications resources and services.  I understand that a violation of this policy may result in disciplinary action, including possible termination of employment, legal action, and criminal liability.


   
Employee Signature


   
Printed Name


   
Department


   
Date

Number of Pages8
DimensionsDesigned for Letter Size (8.5" x 11")
EditableYes (.doc, .wpd and .rtf)
UsageUnlimited number of prints
Product number#43642

Looking for something else?