A well-written and seriously enforced e-mail policy can help you reduce the risk of litigation. By informing your staff of what is permissible to communicate via e-mail and what is not, you reduce the chances of becoming one of the 24 percent of employers who have had their e-mail messages subpoenaed by courts and regulators. Your legal advisors, especially those who specialize in electronic communications, are the final authority on drafting an e-mail policy that is right for your organization. However, you can begin the process by thinking about the following questions:
• What are the acceptable uses of e-mail within your organization as they relate to:
Communicating with clients.
Communicating with other employees.
Communicating with all other business contacts.
Password protection, or encryption.
Confidential and copyrighted information that is to be sent electronically.
Scanning incoming e-mails and attachments for viruses.
• What are unacceptable uses of e-mail within your organization as they relate to:
Transmitting spam.
Sending unprotected messages that contain personal employee information or confidential company material.
Sending messages that contain fraudulent or offensive material.
Using e-mail for purposes that are illegal or unethical.
Forwarding chain letters.
Personal business.
Disseminating, viewing, or storing commercial or personal advertisements, solicitations, promotions, or any other unauthorized materials.
• What are standard mailbox management practices?
Deleting non-work related e-mails, once read.
Deleting work-related messages that are not required for reference, legal reasons, or in-house retention policies.
Setting up folders for organizing and systematizing the filing of retained documents.
• What are unacceptable mailbox practices?
Saving files that are not needed.
Using server space by storing personal messages in folders.
Sending large files that take a long time to download, create storage problems, and may be too big for the recipient’s mailbox.
Storing important files in areas that are routinely purged by IT.