HOME HUMAN RESOURCE BENEFITS COMPUTER BUSINESS
1. Employee Records 1.1. Employee Hire Records 1.2. Hourly Employee Manual 1.3. Salaried Employee Manual 1.4. Supplemental   1.4.1. Understanding Annual W-2   1.4.2. Designated Beneficiary   1.4.3. Contract Employees
2. Payroll Processing -Policies 2.1. Time in a Box Clock 2.2. Salaried Policy & Procedures 2.3. Departments 2.4. Employment Termination 3. Employee Benefits 3.1. Voluntary Employee Insurance
3.3. Savings Program 3.4. Garnishments 3.5. 401K Program      • Pension Protection Act of 2006 3.6. Charities 4. Employee Safety 4.1. Policies
4.3. Mandated Documentation   4.3.1. First Injury Report   4.3.2. OSHA Log   4.3.3. Worker’s Right to Know Act 4.4. Worker’s Compensation 4.5. Safety Committee 5. Records
COMPANY INTRANET
ePOLICY
The Company provides employees with access to it’s network and the Internet for the conduct of its business and expects appropriate and lawfully use. Violation of the following Policy may be subject to disciplinary action, including termination and/or civil prosecution.  Employees should report any misuse to the General Manager.
PURPOSE AND USE Our networks have confidential and proprietary information about the Company, our employees, customers, and suppliers. Employees may not exchange or remove this information from company premises, such as by electronic or other copy, or by transfer via the internet. Copying or backing up any business information to bulk storage, such as USB drives or CD/DVD automatically surrenders that device to company property. Employees should limit their access to the Company networks, including the Internet for business pur- poses only. If in doubt, s/he should ask the General Manager.  The Company determines what files, communications, materials, information, software, and other content and activity are permitted or prohibited. Company failure to take disciplinary action against any non-business use of its information systems does not imply acceptance of that use or limit its ability to take future actions.
PRIVACY The Company reserves the right to monitor, inspect, copy, review, and store at any time and without prior notice any and all usage of its network and access to the Internet, as well as any and all materials, files, information, software, communications, and other content transmitted, received, or stored in connection with this usage. Without exception all such information, content, and files are the property of the Company. Network administrators may review files and intercept communications for any reason, including but not limited to maintaining system integrity and ensuring employees are using the system consistently with this Policy. Employees may personalize their workstations from time to time with pictures on screen savers and monitor wall-paper.  Such images must never be offensive to fellow associates.
The following activities violate the Company’s usage Policy and may lead to disciplinary action
(A) Using, transmitting, receiving, or seeking inappropriate, offensive, vulgar, suggestive, obscene, pornographic, abusive, harassing, belligerent, threatening, defamatory, or misleading language or materials, including ethnic, sexual- preference, or gender-related slurs or jokes. (B) Revealing another employee’s personal information, such as the home address, telephone number, or Social Security number, wages, medical records, etc. (C) Engaging in illegal activities or encouraging others to do so, such as     1. Downloading or transmitting the organization’s confidential information or trade secrets.     2.Using software that is not licensed or approved by the Company.     3.Downloading or transmitting copyrighted materials without permission from the copyright holder. (D) Wasting the Company’s computer resources, such as sending electronic chain letters, personal social networks
(E) Causing harm or damaging others’ property, such as:     1.Accessing, transmitting, receiving, or seeking unauthorized, confidential information about customers or colleagues.     2.Accessing others’ folders, files, work, networks, or computers. Intercepting communications intended for others.     3.Using another employee’s password to trick recipients into believing someone other than you is communicating or accessing the Network or Internet.     4.Uploading a virus, harmful component, or corrupted data. Vandalizing the Network. (F) Jeopardizing Network security by disclosing or sharing passwords and/or impersonating others. (G) Engaging in non-Company related commercial activity, such as selling, buying, soliciting, or advertising goods or services, such as on eBay.
Human Resource > ePolicy
MENU
1. Employee Records 1.1. Employee Hire Records 1.2. Hourly Employee Manual 1.3. Salaried Employee Manual 1.4. Supplemental   1.4.1. Understanding Annual W-2   1.4.2. Designated Beneficiary   1.4.3. Contract Employees  
2. Payroll Processing -Policies 2.1. Time in a Box Clock 2.2. Salaried Policy & Procedures 2.3. Departments 2.4. Employment Termination 3. Employee Benefits 3.1. Voluntary Employee Insurance 3.2. Cafeteria Plan (IRC Section 125)
3.3. Savings Program 3.4. Garnishments 3.5. 401K Program      • Pension Protection Act of 2006 3.6. Charities 4. Employee Safety 4.1. Policies 4.2. Substance Abuse
4.3. Mandated Documentation   4.3.1. First Injury Report   4.3.2. OSHA Log   4.3.3. Worker’s Right to Know Act 4.4. Worker’s Compensation 4.5. Safety Committee 5. Records 5.1. Government Poster Requirements 5.2. Maintenance of Short-Term Documents 5.3. Archive Maintenance
COMPANY INTRANET
ePOLICY
The Company provides employees with access to it’s network and the Internet for the conduct of its business and expects appropriate and lawfully use. Violation of the following Policy may be subject to disciplinary action, including termination and/or civil prosecution.  Employees should report any misuse to the General Manager.
PURPOSE AND USE Our networks have confidential and proprietary information about the Company, our employees, customers, and suppliers. Employees may not exchange or remove this information from company premises, such as by electronic or other copy, or by transfer via the internet. Copying or backing up any business information to bulk storage, such as USB drives or CD/DVD automatically surrenders that device to company property. Employees should limit their access to the Company networks, including the Internet for business pur- poses only. If in doubt, s/he should ask the General Manager.  The Company determines what files, communications, materials, information, software, and other content and activity are permitted or prohibited. Company failure to take disciplinary action against any non-business use of its information systems does not imply acceptance of that use or limit its ability to take future actions.
PRIVACY The Company reserves the right to monitor, inspect, copy, review, and store at any time and without prior notice any and all usage of its network and access to the Internet, as well as any and all materials, files, information, software, communications, and other content transmitted, received, or stored in connection with this usage. Without exception all such information, content, and files are the property of the Company. Network administrators may review files and intercept communications for any reason, including but not limited to maintaining system integrity and ensuring employees are using the system consistently with this Policy. Employees may personalize their workstations from time to time with pictures on screen savers and monitor wall-paper.  Such images must never be offensive to fellow associates.
The following activities violate the Company’s usage Policy and may lead to disciplinary action
(A) Using, transmitting, receiving, or seeking inappropriate, offensive, vulgar, suggestive, obscene, pornographic, abusive, harassing, belligerent, threatening, defamatory, or misleading language or materials, including ethnic, sexual- preference, or gender-related slurs or jokes. (B) Revealing another employee’s personal information, such as the home address, telephone number, or Social Security number, wages, medical records, etc. (C) Engaging in illegal activities or encouraging others to do so, such as     1. Downloading or transmitting the organization’s confidential information or trade secrets.     2.Using software that is not licensed or approved by the Company.     3.Downloading or transmitting copyrighted materials without permission from the copyright holder. (D) Wasting the Company’s computer resources, such as sending electronic chain letters, personal social networks
(E) Causing harm or damaging others’ property, such as:     1.Accessing, transmitting, receiving, or seeking unauthorized, confidential information about customers or colleagues.     2.Accessing others’ folders, files, work, networks, or computers. Intercepting communications intended for others.     3.Using another employee’s password to trick recipients into believing someone other than you is communicating or accessing the Network or Internet.     4.Uploading a virus, harmful component, or corrupted data. Vandalizing the Network. (F) Jeopardizing Network security by disclosing or sharing passwords and/or impersonating others. (G) Engaging in non-Company related commercial activity, such as selling, buying, soliciting, or advertising goods or services, such as on eBay.
Human Resource > ePolicy