Here is a copy of our policy.
INFORMATION SYSTEMS ACCESS AND USE POLICY
To safeguard the confidential and proprietary information developed by {Company Name} as well
as the information entrusted to {Company Name} by its employees, customers, and suppliers, the company
has adopted the following policy:
The use of any information technology equipment owned, leased or rented by {Company Name} for non-business purposes is strictly prohibited. All information transmitted by, received
from, or stored in {Company Name} systems is considered to be the confidential property of {Company Name} and is to be used solely for Lewis business purposes. Any person using {Company Name}’s systems is not permitted to access, copy, transmit or otherwise retrieve any stored
information or communication unless necessary for {Company Name} business purposes.
{Company Name}'s systems allow for the transmission and receipt of both internal and
external electronic mail messages. Electronic mail is to be used for Lewis business purposes only.
{Company Name}. will not tolerate the sending of inappropriate, obscene, harassing or
abusive language or materials. Expressly prohibited is the transmission of any sort of racist,
sexist or other discriminatory comments. The sending of offensive materials, chain letters and
the conduct of illegal activities through electronic mail is not permitted and will not be tolerated.
The illegal transmittal or printing of copyrighted materials is also prohibited.
Company systems may also be connected to on-line computer information services and the
Internet for a variety of business-related purposes. The costs associated with establishing and
maintaining such services are significant in terms of line charges, monthly access fees, etc.
Further, there is a significant labor cost associated with access to these services. For these
reasons, any person accessing the Internet or other on-line services should have legitimate {Company Name} related business purposes for doing so and should limit any time spent on such services.
To ensure that the use of {Company Name}’s systems is consistent with legitimate
business interests, authorized representatives of the company may monitor and/or audit the use
of such equipment and communications. All messages and documents on {Company Name} systems may be
saved for some period of time and deleted messages and documents may be recoverable. As a
condition of employment and continued employment, all Lewis employees are required to sign an
Information Systems Access and Use Acknowledgement Form. Applicants for employment are
required to sign this form on acceptance of an employment offer by the company.
Violations of this policy may result in discipline up to and including discharge.
INFORMATION SYSTEMS ACCESS AND USE ACKNOWLEDGMENT FORM
As a prerequisite for and as a condition of being allowed continued access to any information technology
equipment owned, leased, or rented by {Company Name}, I state the following:
By my signature below, I acknowledge that I have received, read and agree to abide by the
{Company Name} Information Systems Access and Use Policy and that I am further
bound by the representations made in this Acknowledgment Form.
I understand that all information transmitted by, received from, or stored in {Company Name} systems is the
property of {Company Name}. I agree not to access, copy, transmit or otherwise retrieve
any program, file or other information stored in company systems except for {Company Name} business purposes.
I understand that {Company Name} systems are to be used solely for {Company Name} business purposes and not for personal reasons. As such, I understand and agree that I have no
expectation of personal privacy in connection with the use of {Company Name} systems or with the
transmission, receipt, or storage of any information in company systems.
I consent to {Company Name} and/or its authorized representative monitoring and/or
auditing my use of Lewis’ systems or any information stored on those systems at any time in
{Company Name} sole and absolute discretion. Such monitoring an/or auditing may include, but is not
limited to, accessing, printing and reading all electronic mail or other information or files
entering, leaving, or stored in {Company Name} systems, regardless of any personal
passwords I may utilize.
I further understand and agree that my failure to follow any aspect of {Company Name} Information Systems Access and Use Policy may lead to disciplinary action up to and
including termination of my employment. I also understand that Lewis may hold me civilly or
criminally liable for any intentional or reckless damage I cause to {Company Name}
systems or information stored therein.
Name (please print)
Signature
Date