Welcome to Solomon!

Enter the Access Code below

Access code is invalid

Solomon Logo

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Email Usage Guidelines

Purpose and Expectations

Email is a primary tool for business communication at Reliant. It is essential to use email in a responsible, efficient, and lawful manner.

...

 Staff members must ensure all emails sent from their Reliant-assigned account are professional and appropriate, as these emails represent our organization.

Privacy and Monitoring

Please be aware that there is no expectation of privacy for any content created, stored, or transmitted using Reliant's email system.

...

 Reliant reserves the right to monitor email communications and take necessary actions in case of policy violations.

Email Content and Conduct

Avoid sending sensitive or confidential information; never share login credentials via email

...

, and consult your supervisor if unsure.

...

Refrain from sending emails containing libelous, defamatory, offensive, racist, or obscene content. Remember, emails are potentially public and can carry legal implications.

...

Be cautious of email attachments to prevent the spread of computer viruses

...

, and verify the safety of an attachment before sending or opening.

Additional Email Usage Rules

...

Technology Tools Usage

General Guidelines

Reliant provides various technology tools to assist in your daily tasks. These tools must be used responsibly and lawfully.

...

 Special care should be taken when storing and sharing Reliant-related documents, ensuring the security and confidentiality of information.

Document Storage and Sharing

Reliant documents and data should only be stored in and shared through Reliant-provisioned tools and services (e.g., Reliant-provided Google Drive).

...

Do not store, share, or distribute Reliant documents or data on your personal computers or personal accounts with third-party services (e.g., Personal Google Drive). 

...

When sharing documents, ensure that you only share them with the intended recipients, especially if they contain sensitive information.

Policy Compliance

Random audits will be conducted at reasonable intervals to ensure compliance with this policy. Staff will be informed of the audit process.

...

 Violations of this policy may result in disciplinary action, up to and including termination.


...

Examples and Scenarios for Clarity

...