Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

 

THE COLONIAL WILLIAMSBURG FOUNDATION INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
Version 2

...

Abstract

...

The Colonial Williamsburg Foundation has established this policy concerning the acceptable use of critical technology resources and services by its employees, contractors, volunteers, and interns.

Robert W. (Bob) Hodges
Information Security Manager/ ISO

...


Abstract
Overview
Purpose
Scope
Administration of this Policy
Policy
Security and Access
No Expectation of Privacy
Network Systems
Downloading and Installing Software/Website Agreements
Confidentiality and Proprietary Rights
E-mail and Text Messaging
Spam
Etiquette
Personal Use of Colonial Williamsburg-provided E-mail
Phishing
Internet
Personal Use of the Internet
Social Media
Computers and Laptops
Removable Storage Media
Mobile Devices
Lost or Stolen Devices or Data
Telephone and Voicemail
Personal Use
Inappropriate Use of Colonial Williamsburg IT Resources and Communications Systems
Corrective Action
Conduct Not Prohibited by This Policy
Additional Resources

...

CWF's and CWC's policies prohibiting harassment apply to the use of the IT resources and communications systems. No one may use a communications or computer system in a manner that may be construed by others as harassing or offensive based on race, national origin, sex, sexual orientation, age, disability, religious beliefs or any other characteristic protected by federal, state or local law.

Anchor
_

...

Purpose
_

...

Purpose

...

Purpose

The purpose of this Policy is to protect you and Colonial Williamsburg. Inappropriate use exposes Colonial Williamsburg to risks, including, but not limited to, virus attacks, compromise of network systems and services, loss or exposure of data, and legal issues.

Anchor
_

...

Scope
_

...

Scope

...

Scope

This Policy applies to all users of Colonial

...

This Policy applies to all users of Colonial Williamsburg's IT resources and communications systems, including employees, contractors, volunteers, and interns of Colonial Williamsburg. The use of the IT resources and communications systems by an employee, contractor, volunteer or intern of CWF and/or CWC shall signify his or her understanding of an agreement to the terms and conditions of this Policy, as a condition of employment or engagement, as applicable. As used in this policy, "you" means the employee, contractor, volunteer or intern of CWF and/or CWC, as applicable.

...

  • Email systems and accounts
  • Internet and intranet access
  • Telephones and voicemail systems, including wired and wireless phones, smartphones and devices
  • Printers, photocopiers, and scanners
  • Fax machines, e-fax systems, and modems
  • All other associated computer, network and communications systems, hardware, peripherals, and software, including network key fobs and other devices
  • Closed-circuit television and other physical security systems and devices, including key cards and fobs

Anchor
_

...

AdministrationOfThisPolicy
_

...

AdministrationOfThisPolicy

...

Administration of this Policy

The Information Technology Department ("IT Department) is responsible for the administration of this Policy. If you have any questions regarding this Policy, please contact the IT Department.

Anchor
_

...

Policy
_

...

Policy

...

Policy

The

...

Anchor_Toc518556311_Toc518556311 Anchor_Toc518556503_Toc518556503 Anchor_Toc518556602_Toc518556602The IT resources and communications systems are the property of CWF and are to be used for legitimate business purposes. CWF permits CWC and its employees, contractors, volunteers, and interns to access and use the IT resources and communications systems of CWF. You are provided access to the IT resources and communication systems to assist you in the performance of your job. You have the responsibility to use the IT resources and communications systems in a professional, lawful and ethical manner.

Anchor
_

...

SecurityAndAccess
_

...

SecurityAndAccess

...

Security and Access

Security of the Information Technology

...

Anchor_Toc518556313_Toc518556313 Anchor_Toc518556505_Toc518556505 Anchor_Toc518556604_Toc518556604Security of the Information Technology ("IT") resources and communication systems is the responsibility of the IT Department, including approval and control of your and others' access to systems and suspension or termination of access in cases of misuse and you are no longer an employee, contractor, volunteer, intern or other authorized user, or otherwise ineligible to use the systems. Anchor_Toc518556314_Toc518556314 Anchor_Toc518556506_Toc518556506 Anchor_Toc518556605_Toc518556605

It is your responsibility to adhere to the IT It is your responsibility to adhere to the IT security guidelines, including, but not limited to the creation, format and scheduled changes of passwords. All usernames, passcodes, passwords, and information used or stored on CWF's computers, networks and systems are the property of CWF and/or CWC, as applicable. You may not use a username, passcode, password or method of encryption that has not been issued to you authorized in advance by CWF.CW

Anchor_Toc518556315_Toc518556315 Anchor_Toc518556507_Toc518556507 Anchor_Toc518556606_Toc518556606You may not share usernames, passcodes or passwords with any other person. You must immediately inform the IT Department if you know or suspect that any username, passcode or password has been improperly shared or used, of that IT security has been violated in any way.

Anchor
_

...

NoExpectationOfPrivacy
_

...

NoExpectationOfPrivacy
No Expectation of Privacy

All contents of the IT resources and

...

Anchor_Toc518556317_Toc518556317 Anchor_Toc518556509_Toc518556509 Anchor_Toc518556608_Toc518556608All contents of the IT resources and communications systems are the property of CWF and/or CWC, as applicable. Therefore, you should have no expectation of privacy whatsoever in any message, file, data, document, facsimile, telephone conversation, social media post, conversation or message, or any other kind or form of information or communication transmitted to, received or printed from, or stored or recorded on the IT resources and communications systems. Anchor_Toc518556318_Toc518556318 Anchor_Toc518556510_Toc518556510 Anchor_Toc518556609_Toc518556609You are expressly advised that in order to

You are expressly advised that in order to prevent against misuse, Colonial Williamsburg reserves the right to monitor, intercept and review, without further notice, every employee's, contractor's, volunteer's and intern's activities using the IT resources and communications systems, including, but not limited to, email (both incoming and outgoing), telephone conversations and voice mail recordings, instant messages and internet and social media postings and activities, and you consent to such monitoring by your acknowledgement of this Policy and your use of such resources and systems. This might include, without limitation, the monitoring, interception, accessing, recording, disclosing, inspecting, reviewing, retrieving and printing of transactions, messages, communications, postings, log-ins, recordings and other uses of the systems as well as keystroke capturing and other network monitoring technologies.
anchor

_Toc518556319_Toc518556319 Anchor_Toc518556511_Toc518556511 Anchor_Toc518556610_Toc518556610CWF may also store copies of such data and communications for a period of time after they are created and may delete such copies from time to time without notice. Anchor_Toc518556320_Toc518556320 Anchor_Toc518556512_Toc518556512 Anchor_Toc518556611_Toc518556611

Do not use the IT resources and communications systems for any matter that you desire to be kept private or confidential from CWF and/or CWC.

Anchor_Toc518556321_Toc518556321 Anchor_Toc518556513_Toc518556513 Anchor_Toc518556612_Toc518556612CWC uses CWC uses the IT resources and communications systems owned, leased and otherwise made available by CWF to CWC. CWF may disclose to CWC any and all contents of the IT resources and communications systems, including, without limitation, messages, files, data, documents, facsimiles, telephone conversations, social media posts, conversations or messages, or any other kind or form of information or communication transmitted to, received or printed from, or stored or recorded on the electronic information and communications systems, as they are sent to, received from, or otherwise relate to any CWC employee, contractor, volunteer or intern, or CWC's business.

Anchor
_

...

NetworkSystems
_

...

NetworkSystems
Network Systems

Colonial Williamsburg maintains integrated computer and data Anchor_Toc518556323_Toc518556323 Anchor_Toc518556515_Toc518556515 Anchor_Toc518556614_Toc518556614Colonial Williamsburg maintains integrated computer and data communications networks to facilitate all aspects of its business. You may never sign on to any network equipment using the password or user name of another employee, contractor, volunteer or intern. You should not access, attempt to access, alter, or delete any network document except in furtherance of authorized Colonial Williamsburg business.
anchor_Toc518556324_Toc518556324 Anchor_Toc518556516_Toc518556516 Anchor_Toc518556615_Toc518556615

All work product related to Colonial Williamsburg must be stored on the Colonial Williamsburg network. Storing work product on personal computers, other locations and cloud storage, including, but not limited to, Dropbox, Google Drive, iCloud, etc. is prohibited without the express prior approval of the IT Department.

Anchor_Toc518556325_Toc518556325 Anchor_Toc518556517_Toc518556517 Anchor_Toc518556616_Toc518556616Computer resources are not unlimited. Network bandwidth and storage capacity have finite limits, and you must not perform acts that waste computer resources or unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, playing games, engaging in online chat groups, uploading or downloading large files, accessing streaming audio and/or video files, spending excessive amounts of time on the Internet, or otherwise creating unnecessary loads on network traffic associated with the non-business-related use of the Internet. Anchor_Toc518556326_Toc518556326 Anchor_Toc518556518_Toc518556518 Anchor_Toc518556617_Toc518556617

You are You are not permitted to "plug" any personally owned devices into Colonial Williamsburg's wired network. All systems and devices used to connect to Colonial Williamsburg's networks through remote access solutions must be virus free, must be continually executing virus scanning software with a current virus database, must have a firewall activated, and must use the most current version of operating system, with all security patches installed.

Anchor
_

...

Downloading
_

...

Downloading

...

Downloading and Installing Software/Website Agreements

Anchor_Toc518556328_Toc518556328 Anchor_Toc518556520_Toc518556520 Anchor_Toc518556619_Toc518556619E-mail and downloading from the E-mail and downloading from the Internet are prime sources of viruses and other malicious software. Therefore, you may not download or install any software or shareware to your hard drive that is not expressly authorized or approved by the IT Department. In addition, employees may not accept the terms or conditions of website agreements without first obtaining approval from the IT Department. 

Anchor
_

...

Confidentiality
_

...

Confidentiality

...

Confidentiality and Proprietary Rights

Anchor_Toc518556330_Toc518556330 Anchor_Toc518556522_Toc518556522 Anchor_Toc518556621_Toc518556621Colonial Williamsburg's confidential information and Colonial Williamsburg's confidential information and intellectual property (including trade secrets) are extremely valuable to Colonial Williamsburg. Treat them accordingly and do not jeopardize them through your business or personal use of electronic communications systems, including e-mail, text messaging, internet access, social media and telephone conversations and voice mail. Ask your manager if you are unsure whether to disclose confidential information to particular individuals or how to safeguard the company's proprietary rights.
anchor_Toc518556331_Toc518556331 Anchor_Toc518556523_Toc518556523 Anchor_Toc518556622_Toc518556622

Do not use Colonial Williamsburg's name, brand names, logos, taglines, slogans or other trademarks without written permission from Colonial Williamsburg's Legal Department.

Anchor_Toc518556332_Toc518556332 Anchor_Toc518556524_Toc518556524 Anchor_Toc518556623_Toc518556623This Policy also prohibits the use of the IT resources and communications systems in any manner that would infringe or violate the proprietary rights of third parties. Electronic communications systems provide easy access to vast amounts of information, including material that is protected by copyright, trademark, patent, and/or trade secret law. You should not knowingly use or distribute any such material downloaded from the internet or received by e-mail without the prior written permission of the CWF's Legal Department.

Anchor
_

...

Email
_Email

...

E-mail and Text Messaging

Anchor_Toc518556334_Toc518556334 Anchor_Toc518556526_Toc518556526 Anchor_Toc518556625_Toc518556625Colonial Williamsburg provides certain employees, contractors, volunteers and interns with access to e-mail and/or text messaging systems for use in connection with the performance of their job duties. Colonial Williamsburg seeks to provide stable and secure e-mail and text messaging systems (including SMS and internet-based instant messaging) with rapid, consistent delivery times that promote communication for business purposes without incurring unnecessary costs or generating messages that are unproductive for the recipient. Many of the policies described below governing use of the company's e-mail and text messaging systems are aimed at reducing the overall volume of messages flowing through and stored on the network, reducing the size of individual messages, and making the system more efficient and secure.

Anchor
_

...

Spam
_

...

Spam

...

Spam

Unfortunately, users of e- Anchor_Toc518556336_Toc518556336 Anchor_Toc518556528_Toc518556528 Anchor_Toc518556627_Toc518556627Unfortunately, users of e-mail will occasionally receive unsolicited commercial or bulk e-mail (spam) which, aside from being a nuisance and a drain on IT resources, might be a means to spread computer viruses and other malicious software. Avoid opening unsolicited messages and report any suspicious e-mail to the administrator. Delete all spam immediately. Do not reply to the message in any way, even if it states that you can request to be removed from its distribution list. If delivery persists, contact the IT Department who will block any incoming e-mail from that address. Email should only be used for Colonial Williamsburg business. You are not permitted to use the email system for distributing spam or for pyramid or chain letters or other junk email.

Anchor
_

...

Etiquette
_

...

Etiquette

...

Etiquette

Proper business etiquette should be maintained when

...

Etiquette

Anchor_Toc518556338_Toc518556338 Anchor_Toc518556530_Toc518556530 Anchor_Toc518556629_Toc518556629Proper business etiquette should be maintained when communicating via e-mail and text messaging. When writing a business e-mail, be as clear and concise as possible. Sarcasm, poor language, inappropriate comments, attempts at humor, and so on, should be avoided. When communicating via e-mail or instant messages, there are no facial expressions and voice tones to assist in determining the meaning or intent behind a certain comment. This leaves too much room for misinterpretation. E-mail communications should resemble typical professional and respectful business correspondence.

Anchor
_

...

PersonalUseEmail
_

...

PersonalUseEmail
Personal Use of Colonial Williamsburg-provided E-mail

Personal use of Anchor_Toc518556340_Toc518556340 Anchor_Toc518556532_Toc518556532 Anchor_Toc518556631_Toc518556631Personal use of company-provided e-mail is permitted on non-working time only so long as it does not involve unprofessional or inappropriate content and does not interfere with your employment responsibilities or productivity.

Anchor
_

...

Phishing
_

...

Phishing

...

Phishing

You should Anchor_Toc518556342_Toc518556342 Anchor_Toc518556534_Toc518556534 Anchor_Toc518556633_Toc518556633You should be wary of phishing – attempts to trick you into providing personal or financial information via an email request or through a link to a fraudulent website. Phishing is a criminal activity using various techniques to manipulate you into performing actions or divulging confidential information that you would not normally provide. Anchor_Toc518556343_Toc518556343 Anchor_Toc518556535_Toc518556535 Anchor_Toc518556634_Toc518556634Phishing emails may appear to be from a trustworthy

Phishing emails may appear to be from a trustworthy source, but are designed to trick the email recipient into disclosing sensitive, private and confidential information. By clicking on an active link in a phishing email, the recipient may be directed to a fraudulent website that attempts to acquire personal or private information or possibly infect the computer with malicious software. To check the destination of an active link, you should hover your mouse over it and review the address information displayed in the status bar located at the bottom of the screen.
anchor

_Toc518556344_Toc518556344 Anchor_Toc518556536_Toc518556536 Anchor_Toc518556635_Toc518556635Emails that contain obvious spelling errors may be a phishing attempt. Phishers do this intentionally in order to avoid spam filters that many Internet providers use. Anchor_Toc518556345_Toc518556345 Anchor_Toc518556537_Toc518556537 Anchor_Toc518556636_Toc518556636

The email may contain links to the website contain all or part of a real entity's name or web address, but the link itself is not identical to that of the legitimate website. Clicking on these links may take you to a different, possibly malicious website or pop-up window that asks you to provide, update or confirm sensitive personal information.

Anchor_Toc518556346_Toc518556346 Anchor_Toc518556538_Toc518556538 Anchor_Toc518556637_Toc518556637If you If you have questions about whether an email you receive may be a phishing attempt, you should immediately contact the IT Department.

Anchor
_

...

Internet
_

...

Internet

...

Internet

Colonial Williamsburg provides desktop Internet access to certain Anchor_Toc518556348_Toc518556348 Anchor_Toc518556540_Toc518556540 Anchor_Toc518556639_Toc518556639Colonial Williamsburg provides desktop Internet access to certain employees, contractors, volunteers, and interns for use in connection with the performance of their job duties. The following outlines Colonial Williamsburg's expectations regarding internet and social media access and use by employees. Anchor_Toc518556349_Toc518556349 Anchor_Toc518556541_Toc518556541 Anchor_Toc518556640_Toc518556640 Anchor_Toc518558312_Toc518558312 Anchor_Toc518561182_Toc518561182

Personal Use of the Internet

Anchor_Toc518556350_Toc518556350 Anchor_Toc518556542_Toc518556542 Anchor_Toc518556641_Toc518556641We recognize that you may We recognize that you may occasionally desire to access the internet (including social media) for personal activities at the office or by means of the CWF's computers, networks and other IT resources and communications systems. We authorize such occasional use so long as it does not involve unprofessional or inappropriate content and does not interfere with your employment responsibilities or productivity. Anchor_Toc518556351_Toc518556351 Anchor_Toc518556543_Toc518556543 Anchor_Toc518556642_Toc518556642

Using the Internet (including social media) to access pornographic, sexually explicit or "hate" sites, or any other website that might violate the law or Colonial Williamsburg's policies against harassment and discrimination is never permitted.

Anchor_Toc518556352_Toc518556352 Anchor_Toc518556544_Toc518556544 Anchor_Toc518556643_Toc518556643Personal use of the internet (including social media) is never permitted on working time or by means of the company's computers, networks and other IT resources and communications systems.

...

Social Media

Anchor_Toc518556373_Toc518556373 Anchor_Toc518556565_Toc518556565 Anchor_Toc518556664_Toc518556664Social media is technology that enables online users to interact and share information (including video, audio, photographs, and text) publicly or privately. Employees must adhere to Colonial Williamsburg's Social Media Policy & Principles.

Anchor
_

...

ComputersAndLaptops
_

...

ComputersAndLaptops

...

Computers and Laptops

Colonial Williamsburg Anchor_Toc518556354_Toc518556354 Anchor_Toc518556546_Toc518556546 Anchor_Toc518556645_Toc518556645Colonial Williamsburg has a managed desktop policy to help protect the IT resources and communications systems from the threat of virus, malware, etc. A managed desktop policy restricts your right to install software and reduces the risk of being infected with malicious code. Only Colonial Williamsburg issued equipment is allowed to be connected directly to the Colonial Williamsburg network. Anchor_Toc518556355_Toc518556355 Anchor_Toc518556547_Toc518556547 Anchor_Toc518556646_Toc518556646Colonial Williamsburg uses several levels of virus and

Colonial Williamsburg uses several levels of virus and spam monitoring. Upon any indication or notification of any infection, quarantine, or compromised by a virus, Trojan or malicious code, you must immediately stop using your computer and are required to contact the IT Department immediately. The IT Department may, at its discretion, remove and replace the computer.
anchor

_Toc518556356_Toc518556356 Anchor_Toc518556548_Toc518556548 Anchor_Toc518556647_Toc518556647Colonial Williamsburg may require other security measures to be taken to protect computers, such as logging out when your computer is not in use or inactivity timeouts. To prevent unauthorized access to the IT resources and communications systems and to ensure that security updates can be applied to Colonial Williamsburg's computers. Anchor_Toc518556357_Toc518556357 Anchor_Toc518556549_Toc518556549 Anchor_Toc518556648_Toc518556648

You must exercise caution when opening files, attachments or emails from unknown sources. If you are unsure of the validity of a file, attachment or email, please contact the IT Department.

You will be required to use passphrases as an alternative to passwords. What's the difference? A password typically consists of an eight-character entry, usually based on a set of random characters or even a single dictionary word with additional special characters and numbers. Passwords are now trivial to crack with today's modern technology.

The rule for how you will enter the "password" fields now requires longer entries when accessing CWF's networks. Changing the parameters of this one factor alone raises the length of time to an infeasible amount of time and resources to crack. Therefore, CWF will require the use of passphrases.

Anchor_Toc432432101_Toc432432101Passphrases can Passphrases can be a combination of words, letters, numbers, and special characters that can be easily remembered versus a long password.

The following password guidelines should be used to create strong easy to remember passphrases. They:

  • Shall be a minimum of 16 characters in length Anchor_Toc518556363_Toc518556363 Anchor_Toc518556555_Toc518556555 Anchor_Toc518556654_Toc518556654
  • Should not be easily guessed information, such as personal information, names, pets, birth dates, etc.

Anchor
_

...

RemovableStorage
_

...

RemovableStorage
Removable Storage Media

Removable storage media Anchor_Toc518556365_Toc518556365 Anchor_Toc518556557_Toc518556557 Anchor_Toc518556656_Toc518556656Removable storage media, such as CD, DVD, flash drives (also known as jump/thumb/USB drives) or any other external storage devices should be used for business purposes only. Due to the amount of data this type of media will hold, these devices present a security risk and should be avoided when possible.
anchor_Toc518556366_Toc518556366 Anchor_Toc518556558_Toc518556558 Anchor_Toc518556657_Toc518556657

You must use extreme caution to keep this type of media secure to maintain confidentiality. Storage devices or removable media that contain Colonial Williamsburg data, information, files, emails, messages or other content must be adequately erased prior to disposal or reuse. You should contact the IT Department for assistance.

Anchor
_

...

MobileDevices
_

...

MobileDevices

...

Mobile Devices

Colonial Williamsburg supports specific protocols and devices, such as Anchor_Toc518556368_Toc518556368 Anchor_Toc518556560_Toc518556560 Anchor_Toc518556659_Toc518556659Colonial Williamsburg supports specific protocols and devices, such as smartphones, tablets, and other approved devices, for the purpose of providing approved users with Colonial Williamsburg's email, calendar, and contacts. The IT Department will assist you, if you are an approved user, with the initial setup and will troubleshoot issues with Colonial Williamsburg data only. Passwords, encryption, inactivity timeouts or other security measures, such as virus protection, may also be required by Colonial Williamsburg. All other device operation and usage is your sole responsibility. Anchor_Toc518556369_Toc518556369 Anchor_Toc518556561_Toc518556561 Anchor_Toc518556660_Toc518556660

Colonial Williamsburg data, information, files, emailsColonial Williamsburg data, information, files, emails, messages and other content must be wiped by the IT Department before a mobile device is upgraded, recycled or discarded. In addition, Colonial Williamsburg data, information, files, emails, messages, and other content must be wiped by the IT Department upon your termination or separation.

Anchor
_

...

Lost
_

...

Lost

...

Lost or Stolen Devices or Data

Anchor_Toc518556371_Toc518556371 Anchor_Toc518556563_Toc518556563 Anchor_Toc518556662_Toc518556662You are required to immediately report the loss You are required to immediately report the loss of any storage device, including laptops, smartphones, tablets, notebooks, and removable storage media containing Colonial Williamsburg data to the IT Department. Colonial Williamsburg may be able to erase the device remotely. If so, Colonial Williamsburg is not responsible for the loss of any personal information or applications that may be contained on the device.

Anchor
_

...

Telephone
_

...

Telephone
Telephone and Voicemail

Colonial Williamsburg provides landline and/or

...

Telephone and Voicemail

Anchor_Toc518556375_Toc518556375 Anchor_Toc518556567_Toc518556567 Anchor_Toc518556666_Toc518556666Colonial Williamsburg provides landline and/or mobile telephone access and voicemail systems to certain employees for use in connection with the performance of their job duties. To ensure that our customers are provided with courteous and respectful service, and to prevent misuse of the IT resources, your telephone conversations and voicemail messages may, without notice, be monitored, recorded and reviewed. Colonial Williamsburg may also store recorded telephone conversations and voicemail messages for a period of time after they take place and may delete such recordings from time to time.

Anchor
_

...

PersonalUse
_

...

PersonalUse
Personal Use

We recognize that employees might occasionally need to Anchor_Toc518556377_Toc518556377 Anchor_Toc518556569_Toc518556569 Anchor_Toc518556668_Toc518556668We recognize that employees might occasionally need to use company telephones and voicemail for personal activities. We authorize the occasional personal use of the company's telephones and voicemail systems so long as it does not comprise unprofessional or inappropriate conversations or messages and does not interfere with your employment responsibilities or productivity. Colonial Williamsburg telephones may not be used for commercial, religious or political solicitation, or to promote outside organizations.

Anchor
_

...

Inappropriate
_

...

Inappropriate

...

Inappropriate Use of Colonial Williamsburg IT Resources and Communications Systems

Anchor_Toc518556379_Toc518556379 Anchor_Toc518556571_Toc518556571 Anchor_Toc518556670_Toc518556670You are never permitted to use Colonial You are never permitted to use Colonial Williamsburg's IT resources and communications systems, including e-mail, text messaging, internet access, social media, telephones, and voicemail, for any inappropriate or unlawful purpose. This includes but is not limited to:

...

  • _Toc518556380_Toc518556380 Anchor_Toc518556572_Toc518556572 Anchor_Toc518556671_Toc518556671Misrepresenting yourself as another individual or company. Anchor_Toc518556381_Toc518556381 Anchor_Toc518556573_Toc518556573 Anchor_Toc518556672_Toc518556672
  • Sending, posting, recording or encouraging receipt of messages or information that may be offensive because of their sexual, racist, or religious content.
  • Anchor_Toc518556382_Toc518556382 Anchor_Toc518556574_Toc518556574 Anchor_Toc518556673_Toc518556673Revealing proprietary Revealing proprietary or confidential information, including official CWF and/or CWC information, employee information or intellectual property without authorization. Anchor_Toc518556383_Toc518556383 Anchor_Toc518556575_Toc518556575 Anchor_Toc518556674_Toc518556674
  • Conducting or soliciting illegal activities.
  • Anchor_Toc518556384_Toc518556384 Anchor_Toc518556576_Toc518556576 Anchor_Toc518556675_Toc518556675Representing your personal opinion as that of CWF and/or CWC. Anchor_Toc518556385_Toc518556385 Anchor_Toc518556577_Toc518556577 Anchor_Toc518556676_Toc518556676
  • Interfering Interfering with the performance of your job or the jobs of other CWF and/or CWC employees, contractors, vendors or interns.

...

_Toc518556386_Toc518556386 Anchor_Toc518556578_Toc518556578 Anchor_Toc518556677_Toc518556677For any other purpose that violates Colonial Williamsburg's policies or practices.

Anchor
_

...

CorrectiveAction
_

...

CorrectiveAction

...

Corrective Action

Employees, contractors, volunteer, and interns who violate Anchor_Toc518556388_Toc518556388 Anchor_Toc518556580_Toc518556580 Anchor_Toc518556679_Toc518556679Employees, contractors, volunteer, and interns who violate any provision of this Policy are subject to discipline, up to and including termination.

...

Anchor
_

...

Conduct
_

...

Conduct
Conduct Not Prohibited by This Policy

This policy is not intended to restrict communications or actions protected or required by state or federal law.

Anchor
_AdditionalResources
_AdditionalResources
Additional Resources

...

For further information regarding Colonial Williamsburg's technology policy, process, and procedure, please refer to the Information Security Policy Manual and the Employee Handbook.
Anchor_Toc518556393_Toc518556393 Anchor_Toc518556585_Toc518556585 Anchor_Toc518556684_Toc518556684 Anchor_Toc518558324_Toc518558324

For technical assistance regarding such issues with email addresses contact the IT Department.

For assistance with employee management and supervisory issues, including investigations and corrective action, contact your supervisor or your Human Resources Generalist.

For assistance with retention and disposition of email, Internet content or related ancillary technologies' files, contact the Archives and Records Department.