Technology Use Policy
Eagan 4th of July Funfest’s technology systems are provided for the use of Eagan 4th of July Funfest’s board, volunteers, staff and other authorized users in support of the activities of the organization. All users are responsible for using the technology systems in an ethical and lawful manner.
All employees and volunteers with access to the organization’s technology and systems are required to sign agreement to this policy.
This policy may be occasionally reviewed and modified. Upon implementation of a new technology use policy, employees and volunteers will have to sign the new agreement.
A. Rules for Technology Use
I. Use of Emails
- Your email is not secure or private. Emails that you send can be viewed by people other than those you meant to send it to.
- Do not use your organization email when subscribing to personal mailing lists.
- Emails with attachments from unknown senders should be deleted without opening.
- Use a filing system for organizing your emails.
- Never alter the “From:” line information on your email.
II. Security
- All employees and volunteers have the responsibility to keep the organization’s technology secure.
- The technology administrator holds the right to change email passwords.
- No person shall access a computer, files, or applications belonging another employee without that individual’s consent.
- You should not share your passwords with others.
- Personally identifiable information and confidential data collected by the organization should not be transmitted or stored outside of the tools and applications managed by the organization.
III. Privacy
- Technology systems are exclusively the property of the organization.
- Employees or volunteers should not maintain personal information or store or transmit personal information using the organization’s network, equipment, or facilities.
B. Policy Rule Enforcement
- The board (or those designated by the board) may periodically monitor computer usage to ensure adherence to this policy.
- Staff and volunteers using organization resources must inform the board of any computer damage, virus, data loss, and equipment failure.
C. Consequences of Policy Violations
- Failure to abide by any of the above guidelines and policies could result in action directed by the nonprofit’s current practice including dismissal from the organization.
By agreeing below, you acknowledge that you have read and accept the technology use practices, enforcements, and consequences described in this policy.