ICMARC Associate Handbook August 2016

Email Standards and Signatures Part of ICMA‑RC’s branding guidelines involves standardizing each associate’s email signature. Detailed instructions regarding creating and using signatures, sample out-of-office messages, approved marketing messages, and using the Outlook spell check feature can be found in the ICMA‑RC Business & Communication Standards Guidebook , available at my.icmarc.org .

PROHIBITED USES OF EMAIL Prohibited uses of email include but are not limited to the following:

P P Transmitting insulting or offensive messages with regard to race, color, religion, national origin, sex, age, marital status, personal appearance, sexual orientation, gender identity or expression, family responsibility, genetic information, matriculation, political affiliation, physical or mental disabilities, or veteran status or any other category protected by applicable law. P P Distributing communications such as chain letters, racial or sexual jokes, general offensive material, or highly personal correspondence P P Soliciting outside business ventures, advertising for personal gain, or soliciting for purposes unrelated to the corporation P P Distributing copyrighted materials P P Disclosures of ICMA‑RC confidential or proprietary business information consistent with the National Labor Relations Act or any other law. Associates are strictly prohibited from using any other online identity but their own when using the email system. All email messages are the property of ICMA‑RC, and the corporation reserves the right to access and review any email message sent to/from or accessed from ICMA‑RC communication equipment, networks, connections or facilities. Associates are strictly prohibited from using any other online identity but their own when using the email system. All email messages are the property of ICMA‑RC, and the corporation reserves the right to access and review any email message. Associates who misuse ICMA‑RC’s telephone, voice mail or email systems, or other communications or data storage equipment or services may be subject to disciplinary action up to and including termination of employment. (See information about creating, sharing and updating your system/email password in the “Information Security” section of this Handbook on page 99.)

Confidential — for Internal Use Only

Associate Handbook August 2016 | 48

Made with