• News
    • VRM Intel News
    • Latest News
    • Sponsor News
  • COVID-19
  • Marketing
  • Tech
  • OTAs
  • Customer Service
  • Regulations
  • Business
  • Housekeeping
  • Subscribe
  • More
    • Calendar of Events
    • VRM Intel Live!
    • Reports Login
    • VRM Intel Magazine
    • Advertise
    • Authors
    • About Us
    • Contact Us
VRM Intel
  • News
    • Arizonans for Responsible Tourism Pregame Prep Campaign
      Arizonans for Responsible Tourism Hosts Super Bowl Preparedness Campaign for Vacation Rental Operators
    • vacation-rentals-housing-vrm-intel
      Carrots and sticks: Vacation rentals and the creation of affordable, workforce housing
    • Woman dropping off a ballot
      2022 Election Results of Vacation Rental Ballot Measures
    • Recession-Proofing Your Vacation Rental Business
    • How to Increase Your Occupancy in a Competitive Market through Monthly Rentals
    • VRM Intel News
    • Latest News
    • Sponsor News
  • COVID-19
    • Recession-Proofing Your Vacation Rental Business
    • 2022 Vacation Rental acquisitions from AvantStay, VTrips, Vacasa, Meredith, and more
      Who Sold? Here’s What We Know: 2022 Vacation Rental Management Acquisitions
    • 2021/2022 Ski Destinations Showing Big Performance Gains in ADR and RevPAR for Vacation Homes and Condos
    • “It’s like a short-term rental regulation pandemic.” 2022 Spring Vacation Rental Regulatory Trends + Fall Outlook
    • HR 2022: Attracting Today’s New Workforce after the Resignation Tsunami and the Great Renegotiation
  • Marketing
    • Recession-Proofing Your Vacation Rental Business
    • How to Increase Your Occupancy in a Competitive Market through Monthly Rentals
    • board meeting in presentation room
      Tourism Boards and DMOs Offer Seat at the Table for Vacation Rentals
    • Geotargeting & SEM: A How-To Guide on Spending Less & Getting More
    • All About the Data: Predictive Indicators with Jason Sprenkle
  • Tech
    • Recession-Proofing Your Vacation Rental Business
    • Geotargeting & SEM: A How-To Guide on Spending Less & Getting More
    • All About the Data: Predictive Indicators with Jason Sprenkle
    • PriceLabs Announces $30 Million Investment from Summit Partners
    • Ximplifi Adds Owner Portal to Automation Suite for Short Term Rental Accounting
  • OTAs
    • How to Increase Your Occupancy in a Competitive Market through Monthly Rentals
    • Blue Star Acquires Majority Stake in TravelNet Solutions
    • Vacation Rental Data and Revenue Management Conference, DARM 2022, Nashville
      Sessions Details for Upcoming Vacation Rental Data and Revenue Management (DARM) Conference: Livestream/Video Tickets Available
    • Vacasa (VCSA) Stock Falls as Lock-up Period Expires
    • 4 Ways to Stand Out in a Crowded Market: Get Your Brand & Listings in Front of Potential Guests
  • Customer Service
    • Why Not A Hotel? A Guest and Homeowner’s Perspective: There’s No Place Like Home … Or Is There?
    • Leading Proptech Company Guesty Appoints David Aber as CFO
    • Meredith Hospitality Brands Inc. Expands to Mt Hood with Acquisition of Mt Hood Vacation Rentals
    • View of Waikiki from Diamond Head Park, Honolulu, Hawaii
      Honolulu City Council Bans Stays Under 90 Days Across Oahu
    • Are you a Visionary without an Integrator at Your Vacation Rental Management Company?
  • Regulations
    • vacation-rentals-housing-vrm-intel
      Carrots and sticks: Vacation rentals and the creation of affordable, workforce housing
    • Woman dropping off a ballot
      2022 Election Results of Vacation Rental Ballot Measures
    • voters at a polling center voting
      Dozens of Vacation Rental Ballot Measures Heading to Voters this November
    • board meeting in presentation room
      Tourism Boards and DMOs Offer Seat at the Table for Vacation Rentals
    • Arizona state flag outside the legislature buildings at the state capitol
      Arizona Legislature Passes Measure to Restore Some Power to Cities
  • Business
    • Recession-Proofing Your Vacation Rental Business
    • Geotargeting & SEM: A How-To Guide on Spending Less & Getting More
    • All About the Data: Predictive Indicators with Jason Sprenkle
    • PriceLabs Announces $30 Million Investment from Summit Partners
    • Ximplifi Adds Owner Portal to Automation Suite for Short Term Rental Accounting
  • Housekeeping
    • Why Not A Hotel? A Guest and Homeowner’s Perspective: There’s No Place Like Home … Or Is There?
    • Analysis: “Reinventing” Vacation Rental Management by Alex Nigg
    • HR 2022: Attracting Today’s New Workforce after the Resignation Tsunami and the Great Renegotiation
    • Safety First: Evaluating and Addressing Safety Risks at Your Vacation Rentals
    • The Importance of the Guest Experience within Vacation Rental Operations: From the Back of the House to the Front
  • Subscribe
  • More
    • Calendar of Events
    • VRM Intel Live!
    • Reports Login
    • VRM Intel Magazine
    • Advertise
    • Authors
    • About Us
    • Contact Us
  • RSS

Vacation Rental Technology

Employee IT Use & Abuse Policy – Retain Control, Reduce Liability

Employee IT Use & Abuse Policy – Retain Control, Reduce Liability
mm
VRM Intel Staff
May 10, 2014

By Tom K

Your IT Resources are valuable tools used to operate and propel your business. If you want these tools to be respected, you need to ensure your employees understand “Acceptable Use” and sign off on this understanding. Unacceptable use can lead to wasted resources, reduced productivity and, if no Use and Abuse Policy is in place, lawsuits directed towards you and your business.

I just returned from a road trip where I found that a large number of businesses I visited had no IT Use and Abuse Policy in place. Like bad passwords, this is so important, so dangerous, and so easy to correct, I’m pushing IT Use & Abuse Policies ahead of this month’s scheduled topic.

In this month’s newsletter I discuss why an IT Use and Abuse Policy is so important, what the policy needs to include, and how to insure your staff acknowledges they have read and understand the policy.

 

 

Why you need an IT Use and Abuse Policy

The first purpose of the IT Use and Abuse Policy is to educate your staff as to what constitutes Acceptable Use of company IT resources, as well as what is considered Unacceptable. You can have no compliance expectations if you don’t educate.

The second purpose of the IT Use and Abuse Policy, once you have established companywide understanding, is to make the best, most efficient use of your IT Resources. If your staff complies with the policy you’ll be able to stretch your resources (no server storage wasted on iTunes and personal photos), reduce your expenses (no need to increase your Internet bandwidth if they stop downloading movies and stop streaming radio), and increase productivity (eliminate non-company emails, facebook, and twitter).

The third purpose of the IT Use and Abuse Policy is to provide the basis to be able to discipline staff who refuse to comply, and to protect your business from lawsuits arising from illegal or immoral activity originating from within your business IT environment. You effectively eliminate the “I didn’t know… I wasn’t allowed to send out 40,000 pieces of sexist emails” defense, and you protect your business from the liability associated with 40,000 unacceptable emails leaving your mail server.

 

What your IT Use and Abuse Policy should include

The policy should begin with an introduction describing the purpose of the policy, and the employees’ responsibility to comply with the policy.

The policy body should specifically state what is acceptable use of your company’s IT Resources, as well as what is unacceptable, in easily understandable and unambiguous language. It should also discuss the user’s expectation of privacy (there is none) and explicitly state your rights as the owner of the resources. It should close with a clear message that non-compliance is not tolerated and will result in disciplinary action.

Topics that should be discussed in terms of both acceptable and unacceptable use include:

  • Company email
  • Personal email
  • Facebook and Twitter
  • Instant Messaging
  • Internet browsing
  • Internet downloads
  • Internet streaming (audio and video)
  • Using a Secure Password
  • Divulging network credentials
  • Installing unauthorized applications on computers
  • Installing remote access applications on computers
  • Storing personal data (pictures, music, etc) on PCs or Servers
  • Downloading software
  • Connecting any personal device (Laptop, PC, Tablet, Phone) to the Private Business Network
  • Connecting any device (Laptop, PC, Tablet, Phone) to the Private Wireless Network
  • Unauthorized transfer or copying company proprietary or confidential information
  • Connecting any personal storage device (USB Drive, Thumb Drive) to a company computer
  • Copyright infringement
  • Manner and content of all communications originating on company devices
  • Running, authorizing, or assisting with security scans on the infrastructure
  • Any form of harassment
  • Any illegal activity

The policy should also include the very clear statement that all IT Resources are the property of the company, and everything stored, processed, transferred, received, or transmitted by these resources are the property of the company. The company reserves the rights to access, inspect, and monitor all information stored or processed by their resources. As such, an employee should have no expectation to privacy regarding this information.

Additionally, the policy should clearly state that all company data and information is the exclusive property of the company and is considered very confidential. Copying it, removing it from the premises, or divulging it in any way to non-company persons is strictly prohibited. This should be reinforced through the use of Non-Disclosure Agreements (NDAs), signed by every employee.

Finally, the policy should highlight that all IDs, Passwords, electronic Keys, and codes are business confidential and must be kept private. Divulging any of these to unauthorized persons is strictly prohibited and will result in immediate termination.

 

All employees must sign off on the IT Use and Abuse Policy

I strongly recommend that you have all employees sign a statement that they have read and understand the company’s published IT Use and Abuse Policy every year, and that this statement be filed in each employee’s Personnel folder. Annual signing precludes the “I didn’t know you added THAT!” defense.

We advise our clients to include the IT Use and Abuse Policy as part of their Employee Handbook, and have every employee sign off on reading the handbook as part of the annual review process.

This is also a good time to have the employee sign and review their annual NDA, which also goes in their Personnel folder.

 

The Extras

While not directly associated with company IT Resources, this is a good platform to discuss use of personal smart phones while on the clock. Many of our clients now prohibit personal tweets, email, texting, phone calls, and facebook interaction during working hours, so we discuss this in an addendum to the IT Use and Abuse Policy.

We’ll often add a Frequently Asked Questions (FAQ) section to the end of the policy to clarify the topics, and to help simplify the topics. One really nice thing about the FAQ – it is a simple matter to add new questions and answers as your staff presents them.

 

If you have any questions or comments concerning this article, or would like assistance developing an IT Use and Abuse Policy for your company, I’d be happy to discuss this with you at your convenience. Feel free to contact me at TomK@TomKConsulting.com, or via my cell 443.310.5110.

 

 

About Tom K

Tom K has spent the last 28 years working with company leaders to develop their technology strategies and create IT environments that will best serve their business goals, optimize the use of their computing resources, maximize their systems up-time, and get the most out of their IT investment.

Tom K’s experience was developed as a Director and lead consultant with three respected technology firms, one servicing Vacation Rental Management companies across the country, and two servicing NYC Clients in the banking, finance, and manufacturing industries. Tom also served as CTO for an e-Commerce Web Consultation firm and as IT Director for an international consumer testing company. He holds senior technical certifications from Cisco, Microsoft, Citrix, HP, and Intel.

Tom K brought his expertise from Wall St. to the Vacation Rental and Real Estate industry in 2003. Through his technical skills and business acumen, Tom has helped numerous companies effectively utilize technology to realize their business goals, increase productivity, and improve their bottom line.

Tom K’s extensive experience as both consultant and IT Director provides him with an in-depth understanding of the needs and expectations of his Clients, from both the business and the technical prospective. This knowledge allows Tom to consistently provide the solutions and exceptional levels of service required to exceed those expectations.

 

Tom K technology consulting for vacation rental managers

 

 

Related Items
Click to add a comment

Leave a Reply

Cancel reply

Your email address will not be published. Required fields are marked *

Vacation Rental Technology
May 10, 2014
mm
VRM Intel Staff

Related Items

More in Vacation Rental Technology

Recession-Proofing Your Vacation Rental Business

Sarah DuPreOctober 18, 2022
Read More

Geotargeting & SEM: A How-To Guide on Spending Less & Getting More

Jill Highsmith McGeeAugust 18, 2022
Read More

All About the Data: Predictive Indicators with Jason Sprenkle

Rebecca LombardoAugust 16, 2022
Read More

PriceLabs Announces $30 Million Investment from Summit Partners

VRM Intel StaffAugust 5, 2022
Read More

Ximplifi Adds Owner Portal to Automation Suite for Short Term Rental Accounting

VRM Intel StaffAugust 4, 2022
Read More

Blue Star Acquires Majority Stake in TravelNet Solutions

Amy HinoteJuly 26, 2022
Read More
Scroll for more
Tap

Sponsor News

  • Recession-Proofing Your Vacation Rental Business
    BusinessOctober 18, 2022
  • How to Increase Your Occupancy in a Competitive Market through Monthly Rentals
    Industry News for Vacation Rental ManagersSeptember 16, 2022
  • PriceLabs Announces $30 Million Investment from Summit Partners
    BusinessAugust 5, 2022
  • Ximplifi Adds Owner Portal to Automation Suite for Short Term Rental Accounting
    BusinessAugust 4, 2022
VRM Intel
Calendar of Events
Videos & Whitepapers
VRMintel Magazine
Subscribe
Advertise
About Us
Authors
Contact Us

Recent News

  • Arizonans for Responsible Tourism Pregame Prep Campaign
    Arizonans for Responsible Tourism Hosts Super Bowl Preparedness Campaign for Vacation Rental Operators
    Industry News for Vacation Rental ManagersJanuary 18, 2023
  • vacation-rentals-housing-vrm-intel
    Carrots and sticks: Vacation rentals and the creation of affordable, workforce housing
    Industry News for Vacation Rental ManagersDecember 6, 2022
  • Woman dropping off a ballot
    2022 Election Results of Vacation Rental Ballot Measures
    Industry News for Vacation Rental ManagersNovember 11, 2022
  • Recession-Proofing Your Vacation Rental Business
    BusinessOctober 18, 2022

View Current Issue

VRMintel Copyright © 2016-17 | Click HERE to Subscribe | Privacy Policy | Disclaimer | Copyright | Jobs | Facebook | Twitter | LinkedIn

RateCoaster releases dynamic rate tool for the vacation rental industry
Turnkey Vacation Rentals makes Austin’s A-List of the Hottest Startups

xxx videos

  • mamadas
  • redwap
  • free porn
  • porno gratis