Policy On The Use of Assigned Company Property: 1. Purpose
Policy On The Use of Assigned Company Property: 1. Purpose
1. Purpose
The purpose of this policy is to ensure that all property maintained by the Trinity Platform is kept in the best possible
working condition and to ensure proper use of such property and the Trinity Platform networks.
“Property,” as the term is used in this policy, is defined as any piece of equipment, furnishing, vehicle, building or
supply leased, owned, donated or otherwise in the custodial care of the Trinity Platform or any person acting as its
agent.
No Trinity Platform employee should expect any privacy on Company premises or when using Company property or
networks, except that which is required by law.
All employees must maintain his or her work environment in an orderly fashion and follow all Company rules
to ensure its proper use and maintenance.
Any employee who is found to have neglected or misused Company property will be subject to disciplinary
action up to and including termination. If an employee’s misuse of Company property damages the property,
Company reserves the right to require the employee to pay all or part of the cost to repair or replace the
property. Misappropriation of Company property is grounds for immediate termination and possible criminal
action. The Company also reserves the right to demand for replacement of any damaged or lost property
from the employee’s guarantor.
Company property (including computers, pagers, telephones, cell phones, copiers, fax machines, Internet
services and printers) is intended for business use only. Limited personal use as necessary is allowable but
should be the exception and not the rule. Company reserves the right to discipline employees for excessive
personal use of company property.
Any employee for whom driving is an essential job duty must be authorized and approved by the necessary
department to drive Company vehicles. It is the responsibility of the employee driver of a Company vehicle to ensure
that the vehicle is in full operational condition before each use. The employee driver will sign a vehicle log report
noting any problems with, or damage to, the vehicle before each use. Should the employee return the vehicle to the
company with damage to the vehicle, the vehicle log report will be used as support evidence of the condition of the
vehicle before it was used by the employee driver. Any vehicle found to be unsafe will be removed from the
operational fleet until appropriate maintenance or repairs have occurred.
“Information,” as the term is used in this policy, includes without limitation any information owned or used by
Company, such as:
Any information from Company employee personnel files, including employee addresses, telephone
numbers, employment status and wage history.
Any photographs, videotapes and sound clips of any Company employee, customer or client.
Only those employees who are authorized by Company’s board of directors or executive team, or whose job
description permits them to do so, may speak on behalf of Company. Notwithstanding the foregoing, specific
permission from the Company’s board of directors or executive team will be required before any Company employee
may disseminate confidential Company information.
No employee may knowingly dispense such information to any outside party unless authorization has been granted.
This could include other employees who do not have the right to know such information. Any breach will be
considered a violation of Company policy concerning confidentiality, and it may constitute a violation of state or
federal law.
Company reserves the right to monitor at any time any communications that use Company networks in any way,
including data, voice mail, telephone logs, Internet use and network traffic, to determine proper use.
Company will review network communications activity and will analyse use patterns. Company may choose to publish
these data to ensure that company resources in these areas are being used according to this policy.
No employee may knowingly disable any network software or system identified as a monitoring tool.
In witness, have the responsible person append their respective signatures here under on
Signature ……………………………………………….
Signature ……………………………………………….