Confidential — for Internal Use Only
Associate Handbook August 2016 |
48
Email Standards and Signatures
Part of ICMA‑RC’s branding guidelines involves standardizing each associate’s email signature. Detailed instructions regarding creating and
using signatures, sample out-of-office messages, approved marketing messages, and using the Outlook spell check feature can be found
in the
ICMA‑RC Business & Communication Standards Guidebook
, available at
my.icmarc.org.
PROHIBITED USES OF EMAIL
Prohibited uses of email include but are not limited to the following:
P
P
Transmitting insulting or offensive messages with regard to race, color, religion, national origin, sex, age,
marital status, personal appearance, sexual orientation, gender identity or expression, family responsibility,
genetic information, matriculation, political affiliation, physical or mental disabilities, or veteran status or
any other category protected by applicable law.
P
P
Distributing communications such as chain letters, racial or sexual jokes, general offensive material, or
highly personal correspondence
P
P
Soliciting outside business ventures, advertising for personal gain, or soliciting for purposes unrelated to the
corporation
P
P
Distributing copyrighted materials
P
P
Disclosures of ICMA‑RC confidential or proprietary business information consistent with the National
Labor Relations Act or any other law.
Associates are strictly prohibited from using any other online identity but their own when using the email system.
All email messages are the property of ICMA‑RC, and the corporation reserves the right to access and
review any email message sent to/from or accessed from ICMA‑RC communication equipment, networks,
connections or facilities.
Associates are strictly prohibited from using any other online identity but their own when using the email system.
All email messages are the property of ICMA‑RC, and the corporation reserves the right to access and review
any email message.
Associates who misuse ICMA‑RC’s telephone, voice mail or email systems, or other communications or data
storage equipment or services may be subject to disciplinary action up to and including termination of employment.
(See information about creating, sharing and updating your system/email password in the “Information Security”
section of this Handbook on
page 99.)