Welcome to Solomon!

Enter the Access Code below

Access code is invalid

Solomon Logo

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Random audits will be conducted at reasonable intervals to ensure compliance with this policy. Staff will be informed of the audit process.  Violations Violations of this policy may result in disciplinary action, up to and including termination.

Examples and Scenarios for Clarity

To further illustrate the guidelines outlined in this policy, here are some practical examples and scenarios:

Email Usage Examples

  1. Sensitive Information in Emails: Imagine sending an email with confidential donor information, but you accidentally address it to the wrong recipient. This could lead to a breach of confidentiality and potentially harm both the staff member and Reliant.

  2. Rapid Communication and Accuracy: In a hurried response to an email, a staff member might send information that is not verified for accuracy, leading to misunderstandings or misinformation.

  3. Inappropriate Content: A staff member sends an email with jokes that could be perceived as offensive or inappropriate. Even if unintended, such content can reflect poorly on Reliant and the partner church or ministry and lead to disciplinary action.

  4. Email Attachments and Viruses: A staff member forwards an email with an attachment without checking its safety, inadvertently spreading a computer virus. This act can compromise Reliant's IT infrastructure and lead to potential liability.

Technology Tools Usage Scenarios

  1. Document Sharing Mishaps: A staff member shares a document containing sensitive project details on a public link via Google Drive, accidentally allowing access to unauthorized individuals.

  2. Personal Device Usage: Storing organizational documents on a personal device, a staff member's computer gets stolen, leading to a potential data breach.

  3. Non-Business Email Use: Using Reliant's email system, a staff member sends out to all contacts a personal fundraising request for a purpose unrelated to ministry, violating the policy of using email for business purposes only.

Purpose of These Examples

...

.