Training sessions on the various communication methods will be made available at least once yearly. Guidelines
|
|
|
- Herbert Sutton
- 10 years ago
- Views:
Transcription
1 Approved by: Academic Coordinating Committee Authorizer: Manager, Corporate Communications Effective Date: September 1, , Voice Mail and Corporate Calendar Guidelines Note: It is recommended that faculty inform each student group in writing as to their preferred methods of contact (voic , , office hours) so that students can make contact effectively. This is particularly important for faculty who do not have a designated phone extension. Training sessions on the various communication methods will be made available at least once yearly. Guidelines Conestoga delivers official communications via . Employees must use their Conestoga when conducting Conestoga business. Occasional, incidental personal use is permitted, provided it is within expected codes of conduct. Messages sent or received using the Conestoga system are the property of Conestoga and can be accessed by authorized personnel in the event of an appeal or investigation All to current students should be directed to their Conestoga address. Current students must use their Conestoga . Clients/colleagues send s because they wish to receive a quick response. For that reason, should be checked daily and responded to within two business days or less. users are expected to comply with normal standards of professional and personal courtesy, conduct, and communication The Subject field of your should be concise and contain relevant information. This helps recipients locate and possibly file specific messages by subject and reduces the chance of your being stopped by filtering software. In an effort to make efficient use of and communicate appropriately, it is recommended that be concise and to the point and respond to all questions posed by the sender. Use proper spelling, grammar, punctuation, structure and layout. You should also include appropriate greeting and signature lines. It is also advisable to review your message before sending. 1
2 Your signature block should include your name, position, department, and telephone number. In some cases, a fax number may be included. Using the signature block on all outgoing provides recipients with the information required to contact you easily. Full name Title & Department Conestoga College Institute of Technology & Advanced Learning 299 Doon Valley Drive (or alternate campus address) Kitchener, ON N2G 4M ext. address Do not attach unnecessary files and, wherever possible, try to avoid sending large attachments. Do not use attachments for short messages that can be placed in the text of an . Instead, cut and paste text from your word processing program into the message. This eliminates the need for recipients to open a word processing program on their computers to view the attachment. Not all attachments are legible on portable digital assistant devices, so including your message in the text is more reliable. Do not overuse the high priority option. Also, limit your use of URGENT and IMPORTANT. Do not write in CAPITALS unnecessarily. It is generally felt that writing in capitals represents shouting and may trigger an unwanted response. Adding disclaimers to your internal and external s can help protect you from liability. Consider the following examples: 1. An employee accidentally forwards a virus to a customer by . If you add a disclaimer at the bottom of external mail, saying that the recipient must check each for viruses and that it cannot be held liable for any transmitted viruses, this will be of help, if the recipient sues. 2. An employee forwards a racist . If your disclaimer states that Conestoga policy expressly prohibits employees from making defamatory statements, you have a good case of proving that everything was done to prevent offensive s. Use Conestoga s standard disclaimer: This contains privileged and confidential information intended only for the individual or entity named in the message. If the reader of this message is not the intended recipient, or the agent responsible to deliver it to the intended recipient, you are hereby notified that any review, dissemination, distribution or copying of this communication is prohibited. If this communication was received in error, please notify the sender by reply E- mail immediately, and delete and destroy the original message. 2
3 Only use Reply to All if you really need your message to be seen by each person who received the original message. Conestoga provides internal mass mailing lists for sending information out to all faculty and/or students. If you need to reply to one of these s, be sure not to use the reply all function. In addition, you will receive information that may not appear to pertain directly to your position but please glance through it before deleting it. The goal is to help everyone become more aware of happenings at Conestoga. Be careful when using abbreviations such as BTW (by the way) and LOL (laugh out loud) and emoticons, such as the smiley :-). The recipient might be unsure of the meanings of the abbreviations and, in business s, these are generally not appropriate. If you are not sure whether your recipient knows what it means, it is better not to use it. Do not forward chain letters. Do not include any libelous, sexist or racially discriminating comments in communications, even if they are meant to be a joke. Be careful about communicating confidential information. Sending an is like sending a postcard and subject to interception by unintended parties. Employees should ensure all s sent to students are professional in nature, because students could save s and refer to them either internally, when planning appeals, and/or externally, when interacting with the public. If you are away from the office for more than a day, you must activate the Out of Office feature to advise senders you are unavailable. If the reason for their communication is urgent, they will know immediately that they must contact an alternate or call the department for assistance. Sample Out of Office Message: I will be away from the office from Monday, March 15, to Friday, March 19, and will respond to your message, when I return on Monday, March 22. If you need immediate assistance, please contact Fred Gables at , ext or [email protected]. If your mailbox is at capacity, you will be unable to send messages. Your mailbox should be maintained daily by archiving or permanently deleting messages, especially those with large attachments. 3
4 All instant messaging communications and information transmitted as it relates to students, clients, business associates and Conestoga employees must use Conestoga s IM system in accordance with the following rules. Instant Messaging (IM) Rules 1. Use professional and appropriate language in all instant messages. Employees are prohibited from sending abusive, harassing, threatening, menacing, discriminatory, pornographic, disrespectful, or otherwise offensive instant messages. 2. Employees are prohibited from sending or receiving jokes, rumours, gossip or unsubstantiated opinions via IM. These communications, which often contain objectionable material, are easily misconstrued when communicated electronically. 3. Employees may not use IM to transmit confidential, propriety, personal or embarrassing/potentially embarrassing information about the Conestoga, employees, clients, business associates or other third parties. 4. Employees may not share confidential, proprietary or embarrassing/potentially embarrassing business-related or personal IMs with the media, competitors, prospective employers or other third parties. 5. Employees shall have no reasonable expectation of privacy when using Conestoga s IM system. Conestoga reserves the right to monitor employee s use of the IM system. 6. All IM communications and information transmitted, received or archived within the company s IM system, are the property of Conestoga. 7. Employees are only to share their IM usernames with colleagues on a need-to-know basis. 8. Treat IM messages as business records that may be retained and could be used as evidence in litigation, audits and investigations. Voic Guidelines Your voic greeting must be updated regularly to ensure it appropriately reflects your availability and commitment to respond. Voic greeting must contain: your name and/or department name if you have a back-up or assistant, their name and extension when you will return the call 4
5 if you are absent, you must update your greeting to advise callers and instruct them what to do (i.e. I will be out of the office. If you require immediate attention, please call ) If you share a voic box, the greeting should indicate that the mailbox is shared and provide the appropriate instructions for leaving a message. Voic boxes should remain confidential and employees should not share passwords. As a general rule, you are expected to check your voic several times a day. In the case of faculty, you are expected to check voic on a daily basis. All employees should respond to calls within two business days or less. Voic boxes should be cleared routinely. When you are away from your phone (e.g., teaching, at a meeting, on vacation, etc.) or leave work for the day, you should forward calls to your voic . By doing so, the caller saves time, because they are not required to listen to multiple rings before leaving a message. You should not forward your phone to another employee s extension unless there is a strong business need to do so (e.g., a supervisor may forward their phone to their assistant or a colleague, if they are waiting for a call that needs an immediate response). When leaving a message for an external client, remember to leave your name, department, and organization name, the Conestoga phone number, your extension and the reason for your call. When leaving a message for a fellow employee, remember to leave your full name, department, telephone extension and the reason for your call. This saves time, when the caller is responding to you. Voic is not to be used to avoid answering calls or to screen calls. If you will be away from Conestoga for an extended period of time, you should indicate that in your greeting and advise the caller that you will not be able to respond and who they should contact as an alternative. Recommended sample scripts: 1) Hello, you have reached Mary Smith s voice mail in the department on January 21. I m sorry I have missed your call. Please leave a detailed message and I will return your call within two business days. 5
6 2) Hi, you have reached Mary Smith s voice mail in the Facilities Services Department. Today is Wednesday, January 21. I will be in meetings for most of the afternoon. I m sorry that I ve missed your call. Please leave me a message, together with your number, and I will return your call as soon as possible. If your call is urgent, please call our department receptionist at extension xxxx for assistance. 3) Hello, you have reached Mary Smith, Professor of in the School of at Conestoga. It s Wednesday, January 21, and I ll be out of the office all day today without access to voic . I will be returning to the Conestoga tomorrow. Please leave me a detailed message including your contact information and I will get back to you when I return. If you require immediate assistance, please call extension xxxx and speak with our department receptionist. 4) Hi, you ve reached Mary Smith s confidential voic in Human Resources. I will be out of the office from Wednesday, January 21, through Friday, January 23. While I am away, Jean Brown will be acting for me. Jean can be reached at , extension xxxx. If you d like to leave me a message with your number, please do so, and I will get back to you when I return. The Mitel Voic Users Guide can be found on the IT Service Desk website, For assistance contact the IT Service desk at extension 3444 or [email protected]. Corporate Calendar Guidelines Employees are expected to keep their on-line calendar up to date with all work commitments including classes, office hours, meetings, and vacation days. Proxy access to an employee s calendar should be provided to colleagues in the same department and employees in other areas of Conestoga as appropriate. Only those with proxy access can see details of your scheduled events. The corporate calendar allows you and your working group to plan by storing information on work hours, events, meetings, deadlines, conference calls, vacation days and so on. Calendars can be updated with both recurring and individual events. The calendar can be accessed at Conestoga or remotely via the Internet. Using the Check Busy search feature is helpful, when trying to find a date/time that is convenient for all potential meeting attendees. 6
7 Conestoga will endeavor to update the calendar regularly with Conestoga-wide events, e.g., Explore Conestoga, KPI, semester start and end dates, official holidays, etc. Revision Date July 14, 2010 August Summary of Changes Policies and Procedures Committee - Approved Academic Coordinating Committee - Approved 7
COLLEGE POLICY MANUAL
Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;
Good Communication & Customer Service Basics. Brought to you by Human Resources and Information Services & Resources
Good Communication & Customer Service Basics Brought to you by Human Resources and Information Services & Resources Presentation Contents Principles of Good Communication Telephone Guidelines Voice Mail
You ve Got Email Etiquette
You ve Got Email Etiquette Email has become a way of life! We use it instead of snail mail and telephone calls. It has become a powerful tool, but can be a terrible thing if used incorrectly. Be concise
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Voicemail User Guide UCLA INFORMATION TECHNOLOGY SERVICES
Voicemail User Guide UCLA INFORMATION TECHNOLOGY SERVICES 1 Introduction UCLA Voicemail is a dynamic communications tool that provides you with a personal voice mailbox accessible from any touch-tone telephone
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
What do you need to know in the workplace?
What do you need to know in the workplace? Your internship may be the first time you ve worked in a professional setting. People will expect you to act as a professional. The rules are different among
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
Email Policy For Staff and Students
Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Please let us know if you need anything. Our customer service number is 1-866-311-5900. We re always happy to help.
Dear Valued Customer, We are proud to welcome you to the EvenLink s Crystal Clear Digital Phone service. Our network reliability, customer support and value pricing are a great combination. We appreciate
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate
EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used
Customer Service Communications Guidelines
Customer Service Communications Guidelines Effective October 1, 2013 Purpose Authority Reference Resource To establish Customer Service Communications expectations for the Department of Natural Resources
INFORMATION TECHNOLOGY SECURITY AND APPROPRIATE USE POLICIES (INCLUDES INTERNET, EMAIL, AND TELEPHONE) ACKNOWLEDGEMENT
INFORMATION TECHNOLOGY SECURITY AND APPROPRIATE USE POLICIES (INCLUDES INTERNET, EMAIL, AND TELEPHONE) All Early Learning Coalition of Indian River, Martin, and Okeechobee Counties (herein referred to
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Guidelines on developing a policy for managing email
Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government
Contents. Note: Feature commands and/or functionality may vary dependent on the telephone equipment you choose to use with this product.
Contents Address Book 4 Anonymous Call Rejection 5 Call Block 5 Call Forward 6-7 Call Hold 7 Call Log 8 Call Return 8 Call Waiting 9 Caller ID 10 Outbound Caller ID Block 10 Outbound Caller ID Deactivation
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
COLLINS CONSULTING, Inc.
COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Additional Unity Connection Operation
Quick Info for the Cisco Unity Connection Voicemail To access voicemail Press the envelope button on your phone, and follow the prompts. Sedona and Verde From off campus dial 649-5556, or from any campus
TRANS-VIDEO PHONE SERVICE
TRANS-VIDEO PHONE SERVICE FEATURE GUIDE telephone number username password Manage your account online at: www.trans-video.net/voice.html CONTENTS Address Book Anonymous Call Rejection Call Block Call Logs
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy
Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs
About Your Email Policy Kit
Email Policy Kit About Your Email Policy Kit About Your Email Policy Kit... 2 Email Policy 101... 3 Designing an Email Policy: Key Sections... 4 Sample Records Retention Policy for Electronic Mail... 11
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Professional Telephone Courtesy Guide
Professional Telephone Courtesy Guide Table of Contents Who are our Customers?... 2 Telephone Courtesy... 3 Answering the Telephone... 5 Placing a Caller on Hold... 6 Keeping Your Staff Well Informed...
POLICY ON USE OF INTERNET AND EMAIL
POLICY ON USE OF INTERNET AND EMAIL OVERVIEW Public sector employees are accountable for their use and management of all public resources including the use of services such as the Internet and electronic
Internet, E-mail and SMS Texting Usage Policy Group Policy
Internet, E-mail and SMS Texting Usage Policy Group Policy Scope: This Orbit Housing Group Limited ( Group ) policy provides a set of guidelines for all users within the Group on the proper usage of the
User Guide. Quick Reference Instructions. Verizon Home Voice Mail
Quick Reference Instructions Verizon Home Voice Mail Your first step... ALWAYS GET INTO YOUR MAILBOX FIRST To do this from your home telephone, dial the Home Voice Mail system number, then enter your passcode.
Voice Mail Instructions
Welcome Your Avaya voice messaging system is a complete call answering and voice mail system. Call Answering Intuity AUDIX answers your calls when you are unavailable or too busy to answer your phone.
With the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
Email standards, protocol and guidance
Email standards, protocol and guidance July 2010 1 Email standards, protocol and guidance A good guide to communications for staff Introduction The following guidance introduces good practice for writing
OHIO EXPOSITIONS COMMISSION CUSTOMER SERVICE GUIDELINES
OHIO EXPOSITIONS COMMISSION CUSTOMER SERVICE GUIDELINES The Ohio Expositions Commission (OEC) is committed to providing the best possible service to customers both internal and external. In support of
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
Email Etiquette. Why do we need Email Etiquette? PROPER EMAIL FORMATTING. Email Etiquette Kelly Levander
Email Etiquette Why do we need Email Etiquette? Professionalism: : by using proper email language you and your company will convey a professional image. Efficiency: emails that get to the point are much
VERIZON VOICE MAIL USER GUIDE DC/DE/MD/NJ/PA/VA REGION BUSINESS
VERIZON VOICE MAIL USER GUIDE DC/DE/MD/NJ/PA/VA REGION BUSINESS ABOUT YOUR VERIZON BUSINESS VOICE MAIL SERVICE Business Voice Mail service can be a benefit to your business and to callers who need to leave
IPitomy User Guide Business Phones Conferencing Voice Mail
IPitomy User Guide Business Phones Conferencing Voice Mail Using Your Telephone Your new telephone is a state of the art IP Telephone instrument. It is manufactured by Aastra, the manufacturers of Northern
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
Address Book. Store all of your contacts in your online Address Book.
Contents Address Book 4 Anonymous Call Rejection 5 Call Block 5 Call Forward 6-7 Call Logs 7 Call Return 7 Call Waiting 8 Caller ID 9 Do Not Disturb 10 Find Me 11 Outbound Caller ID Block 9 Selective Call
City of Venice Information Technology Usage Policy
City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Centrex Messaging. User Guide
Centrex Messaging User Guide Centrex Messaging User Guide Welcome to Centrex Messaging. This guide will get you up and running and help you understand the basic features of this service. We strongly encourage
Email Policy and Code of Conduct
Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY
Forest Preserve District of Cook County, Employee Handbook Use of District Property Section: Page 17
POLICY PROCEDURE GUIDELINES 03.60.00. POLICY STATEMENT POLICY NUMBER: 03.60.00. SUBJECT: Email Usage & Email Blasts Policy (Including the Internal & External Communications Guidelines) PAGE NUMBER: 1 of
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY
ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT
Home Voice Mail. User Guide. 2014 Frontier Communications Corporation. HVM_UG_0414
Home Voice Mail User Guide 2014 Frontier Communications Corporation. HVM_UG_0414 Basic Standard OnePoint Voice Mail Greeting 5 minutes 5 minutes 5 minutes Busy Greeting Message Storage 30 days 30 days
Features & Instructions Guide For Your New VoIP Services
Features & Instructions Guide For Your New VoIP Services Coast Communications 349 Damon Rd NE Ocean Shores, WA 98569 Phone: 360-289-2252 Fax: 360-289-2750 Email: [email protected] WELCOME This Guide
CALL MANAGEMENT SERVICES. User Guide. 1 888 télébec telebec.com
CALL MANAGEMENT SERVICES User Guide 888 télébec telebec.com QUICK REFERENCE Télébec Call Management Services - Important Codes Service Activation Cancellation Call Blocking 6 7 Call Forwarding 7 2 7 3
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
Anonymous Call Rejection
Anonymous Call Rejection Don t waste time taking calls you don t want. Anonymous Call Rejection (ACR) allows you to block incoming calls from people who use *67 to block their phone number as well as calls
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
Pacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
POLICY AND PROCEDURES OFFICE OF COMMUNICATIONS. Email Best Practices. Table of Contents
POLICY AND PROCEDURES OFFICE OF COMMUNICATIONS Email Best Practices Table of Contents PURPOSE...1 BACKGROUND...1 POLICY...1 RESPONSIBILITIES...2 PROCEDURES...2 REFERENCES...2 DEFINITIONS...3 EFFECTIVE
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
BUSINESS VOICEMAIL User Guide
BUSINESS VOICEMAIL User Guide Voicemail BASICS You may interact with your Voicemail Service from any Touch-Tone telephone. You can receive messages 24 hours a day, 7 days a week. You may have a total of
City of Grand Rapids ADMINISTRATIVE POLICY
City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC
Verizon Business National Unified Messaging Service Enhanced Service Guide
USER GUIDE Voice Verizon Business National Unified Messaging Service Enhanced Service Guide What Is Unified Messaging? Verizon Business National Unified Messaging Service is an interactive voicemail system
Data Solutions Internet Solutions Managed Solutions. Qwest Business Voice Messaging Service USER GUIDE
Voice Solutions Data Solutions Internet Solutions Managed Solutions Qwest Business Voice Messaging Service USER GUIDE Y O U R E A L W A Y S C O N N E C T E D Welcome! Increased efficiency, productivity
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
MX-ONE Messaging Voice Mail 4.2
MX-ONE Messaging Voice Mail 4.2 Telephone User Interface User Guide MX-ONE Messaging Voice Mail 4.2 USER GUIDE Copyright 2008. Aastra Telecom Sweden AB. All rights reserved. This document contains proprietary
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
