Computer Use Policy Template

This Computer Use Policy template is a set of guidelines and policies for employees to comply with. It serves as safety measures for the employer to ensure that their equipment as assets serves its purpose to the Company.

I. POLICY BACKGROUND

This Computer Use Policy is designed and formulated to help employees and managers recognize their responsibilities when they accept their company-owned assets – namely laptop, mobile, computer, and peripherals – from the start of their report to work with our company, [Employee.Company] .

II. PURPOSE

This Computer Use Policy aims to achieve these outlined goals for the safety and security of the employees and the management under [Employee.Company] :

To utilize the asset to its fullest potential while delivering quality work from the employees. To maximize the investment of equipment to better serve the clients.

To ensure that all designated users of the assets are responsible and compliant with the company's security and equipment care guidelines.

To encourage employees to maximize the use of the asset only to benefit the Company and its clients. To ensure that employees of the Company are aware of the proper and appropriate use of these assets.

III. DEFINITION OF TERMS

Company-owned Assets

Refers to the provided equipment, which includes assets such as a laptop, mobile, and computer along with its peripherals. These assets are given to the employee to perform the tasks, assignments, and responsibilities accordingly and properly for the Company.

Asset Custodian

This refers to any device being connected to the equipment. There are three kinds of peripherals: input, output, and storage.

Input peripherals are devices that convert incoming data and instructions in the computer, allowing you to control, connect, and interact with it, such as a keyboard, mouse, microphone, camera, pen tablet, joystick, etc.

Output peripherals are devices that include video displays or visual terminals such as projectors, scanners, monitors, printers, and speakers.

Storage peripherals are devices where data is stored and recorded, such as internal and external hard drives, CD and DVD drives, RAM and ROM, and flash memory drives.

IV. PERSONNEL RESPONSIBILITIES

This Computer Use Policy states below all the responsibilities the asset custodian or the employee must adhere to while employed or reporting under [Employee.Company] :

Employees will use these company-owned assets, namely laptop, mobile, computer, and their peripherals, solely for the delivery of quality assignments and tasks exclusively for [Employee.Company] . Failure to comply with this policy will subject the employee to disciplinary actions or termination of the contract.

All employees working under [Employee.Company] are brand ambassadors and should comply with the proper ethics and conduct established by the Company within and outside the company's online and offline premises. Employees will not engage in strictly prohibited and unprofessional activities such as pornography, cyberbullying, cybercrime, abuse, and threats using the company-owned asset to preserve the company's best image. Failure to comply with this policy will subject the employee to termination of the contract.

The employee is strictly prohibited from executing or installing any programs or applications, not prescribed and approved by the Company, on their laptop, mobile, or computer. Installation of external programs is only permitted with advanced approval from the IT department.

The designated user of the company-owned asset is required to properly log off or sign out of the system after office hours as part of the device security measures.

The asset custodian is expected to display great care and responsibility for the company-owned asset provided to him/her. Failure to comply with this policy will subject the employee to a one-time payment of the damaged property's actual price, along with its charges, should disciplinary action measures be deemed necessary.

The asset custodian must submit a status report every two (2) years to our IT department regarding the equipment status and whether it should be replaced, upgraded, or updated.

The employee is expected to never commit to an act or object that will endanger the company-owned asset.

​ [Employee.Company] acknowledges that the employee’s life is more valuable than the company-owned asset. Should such unforeseen circumstances as natural disasters or crimes such as hold up or mugging happen, the employee will be investigated and required to submit a written explanation or incident report within five (5) business days. The Company will provide a new set of equipment to the employee after three (3) business days resting period.

The employee is required to submit an incident report should there be any suspicious activities made by other colleagues. The report can be done through email or as an anonymous report to our Ethics department.