Skip to main content
Personal Technology Usage Policy Concepts
What's Included
 
 
 
This single static template
 
 
 
90 contract template library
 
 
 
Starter proposal template library
 
 
 
Novice quoting software
 
 
 
340 contract templates
 
 
 
700 proposal layouts
 
 
 
200 completed sample proposals
 
 
 
110 project templates
 
 
 
Expert quoting software
 
 
 
Document branding features
 
 
 

How to write your Personal Technology Usage Policy

We include this 5 page template with Human Resources Contract Pack and the Proposal Kit Professional. You will get more content and software automation for data merging, managing client documents, and creating proposals with line item quoting with a Contract Pack or the Professional.

Supported Operating Systems LogosDOWNLOADABLE, ONE-TIME COST, NO SUBSCRIPTION FEES
Use the Personal Technology Usage Policy as a human resources policy for employees and contractors regarding use of personal technology in the course of their duties.
Document Length: 5 Pages
Quote Logo What Our Clients Say

Photographers Contract Pack offers me exactly what I need. From contracts to model releases the kit offers everything I need to make it through my day to day jobs."

Larry Radloff
Sport and Sound Productions

1. Get Human Resources Contract Pack or the single template that includes this business contract document.

We include this Personal Technology Usage Policy in editable Word format that can be customized using your office software.

2. Download and install after ordering.

Once you have ordered and downloaded your template or pack, you will have all the content you need to get started.

3. Customize the contract template with your information.

You can customize the contract document as much as you need. If you get a Contract Pack or Professional Bundle, you can also use the included Wizard software to automate name/address data merging.

Personal Technology Usage Policy

How do you write a Personal Technology Usage Policy document?

PERSONAL TECHNOLOGY USAGE POLICY

(Tablets, Smartphones, Laptops and other Devices). The purpose of this document is to set forth a Company Personal Technology Usage Policy by which employees and contractors will abide while using, leasing or otherwise making use of personal technology in the course of their duties while employed at Company Name. The intent of this policy is to provide proper guidance to employees and contractors who make use of personal technology during the course of their work with Company Name.

As an employee or contractor of Company Name, you are required to comply with this policy at all times.

Terms and Conditions

The Personal Technology Usage Policy is as follows:

Definitions

For the purpose of this Personal Technology Usage Policy, "Personal Technology" shall be defined as a hand-held computing device, tablet or phone ("smartphone") that provides Internet access (wireless, cellular or otherwise), software applications, communication and/or email services, and network connectivity through cellular, Wi-Max, Wi-Fi or other ad-hoc networks. For the purpose of this Personal Technology Usage Agreement, "Company Services" shall be defined as all resources provided to employees by Company in order to fulfill their duties as employees.

This list includes, but is not limited to:

Email, webmail, chat and other forms of communication associated with the Company. FTP, SFTP, SSH, Remote Access or Virtual Private Networks (VPN). Online access to Company portals, online software or resources. Remote access to Company computers or servers.

Approved List of Devices (Hardware)

Due to the changing nature of Personal Technology devices, Company Name may at its sole discretion, decide to not allow or support specific devices or technologies that interact with its network. This list is subject to change and may be amended to adapt to specific Company needs and requirements.

The following devices shall be allowed to interact with Company networks or resources:

Approved List of Software and Technologies

In order to effectively interface with Company resources, networks, mail servers and other communication systems, the following software and technologies shall be required for use in the following Company tasks. There shall be no exception to this list without prior written approval from IT Department, Manager, etc. Due to the changing nature of Personal Technology devices, Company Name shall only support a limited number of hardware devices and configurations. This approved list is subject to change and may be amended to adapt to specific Company needs and requirements.

The following required software and technologies shall be used for the following tasks:

  • Email/Calendar Client.
  • Docking, "Hot Synch" or other Synchronization Systems.
  • Operating Systems (OS).
  • Virtual Private Networking (VPN).
  • FTP / SFTP or SSH Access.
  • Instant Messenger (IM) or Chat Programs.
  • Other Software Systems.

Limits on Use of Personal Technology

The use of Personal Technology is for the Company's benefit and the convenience of the Employee. Employees must still adhere to the Company Communications and Email policies, whether they are using Personal Technology Devices or their normal work station(s). Any integration between a Personal Technology device and Company resources must not use the Company resource (Company email, VPN, etc.) for personal usage.

Personal Technology General Usage Policies

Use of Personal Technology by Company employees and contractors shall be governed by the Company Internet Access and Asset Usage Policy as well as the Company Wireless Network Usage Policy. Copies of these policies may be obtained from the Company Human Resources Department.

Company's general personal technology usage policies are as follows:

All Personal Technology must have the Company-required applications and security software installed prior to accessing Company resources or networks. Employees must have the Company IT Department review and certify that all Personal Technology meets the Company Network Security Policy prior to use. All Personal Technology shall make use of access control systems (password protection) and encryption. Personal Technology devices that interact with Company resources can get lost and access control systems help prevent outsiders from gaining access to Company networks and systems.

All Personal Technology and software running on Personal Technology devices must use complex passwords and secure digital certificates for remote access where appropriate. All Personal Technology shall make use of self-updating or software that automatically updates itself to ensure that the devices comply with the Company Network Security Policy. All Personal Technology, whether owned by the employee or not, that interacts with Company resources, shall be subject to on-demand audits by the IT Department or Managers to ensure compliance with the Company Network Security Policy.

Personal Technology Usage and Your Health and Safety

Improper usage or overuse of Personal Technology can lead to injury, tendonitis or swelling of tissues and joints. The following tips are provided to help you avoid such injury while you use your Personal Technology. If you have questions or concerns or would like a demonstration of these safety techniques, please contact the Human Resources Department.

Proper use of your Personal Technology includes:

Taking frequent breaks from using your Personal Technology. Immediately stopping use if you experience any of the following symptoms: pain in your thumb, fingers, wrist joints or anywhere else on your body. Immediately stopping use if your hands or extremities feel numb or are tingling.

Avoiding typing for more than a few minutes at a time. Avoiding typing only with your thumb. Making sure that your wrists are in an upright position and not flexed or bent when typing.

Try placing a support underneath your Personal Technology whenever possible.

The following is the Company policy for using Personal Technology while operating a motor vehicle:

You may not text, email, use a web browser or otherwise use your Personal Technology in any way while driving or operating a motor vehicle.

The American Physical Therapy Association recommends the following simple exercises:

Tap each finger with the thumb of the same hand.

Repeat five times

Alternate tapping the palm of your hand and the back of your hand against your thigh as quickly as you can.

Repeat 20 times

Open your hands and spread your fingers as far apart as possible. Hold for 10 seconds and repeat eight times. Fold your hands together, and turn your palms away from your body as you extend your arms forward.

You should only feel a gentle stretch. Hold for 10 seconds and repeat eight times. Fold your hands together, turn your palms away from your body, and extend your arms overhead. You should feel the stretch in your upper torso and shoulders to hand.

Hold for 10 seconds and repeat eight times. Responsibility and Storage of Personal Technology. Company shall not be responsible for any loss or damage that may occur to their Personal Technology Devices at any time.

Modification of Policy

Company reserves the right to add, modify, or delete any provision of this Policy at any time and without notice. Company reserves the right to restrict any access right at any time, whether a violation of this Policy occurs or not. Company reserves the exclusive right and will be the sole arbiter as to what constitutes a violation of any of these provisions.

Improper or Illegal Conduct

Failure to adhere to the provisions of this Policy may result in disciplinary actions and/or termination.

The following shall be construed as violations:

Allowing access to any restricted information by unauthorized personnel or purposefully allowing unauthorized personnel to gain access to Personal Technology for non-company or non-authorized activities. Allowing dangerous or restricted software or applications to be installed on the Personal Technology at any time. Engaging in any behavior with Personal Technology that would violate the Company Wireless Network Usage Policy or Company Internet Access and Asset Usage Policy.

Consequences of Violation

If Company becomes aware of an alleged violation of any of the terms contained in this Policy, or any other policy that has been posted on its web site, made available to employees or contractors via email, or posted in any other form, Company shall initiate an investigation. During the investigation, Company may restrict access to the employee's Personal Technology, whether personally owned or otherwise, in order to prevent further possible unauthorized activity. Company may, at its sole discretion, restrict, suspend, or remove employee's Personal Technology without notice or refund, or pursue civil remedies as it deems necessary. Company shall notify the appropriate law enforcement department of any such violations.

Company shall not be responsible for any payment, refunds, or compensation in any way for service disruptions or termination resulting from violations of this Policy.

Effective Date: Current Date

The complete Personal Technology Usage Policy - with the actual formatting and layout - is available as a single template or as part of a library of related templates in a Contract Pack or the Professional Bundle.
Personal Technology Usage Policy
Related documents may be used in conjunction with this document depending on your situation. Many related documents are intended for use as part of a contract management system.

Related Documents

Key Takeaways

  • The Personal Technology Usage Policy is available as a ready-to-edit template.
  • The Contract Packs and Professional Bundle include many related agreements and documents.
  • You can automate financials and data merging into contracts using a Contract Pack or Professional Bundle.
  • You can also create business proposals and integrate your contracts using the Professional Bundle.
  • There are no ongoing subscription fees. You get lifetime unlimited use.

How to Build a Legal Contract with Proposal Kit

This video illustrates how to create a legal contract using the Proposal Pack Wizard software. It also shows how to create a proposal with an invoice and contract at the same time.

Frequently Asked Questions

How do I customize the Personal Technology Usage Policy to fit my business needs?

Customizing the Personal Technology Usage Policy involves editing the document to include your business details, terms, and conditions. The templates are designed to be flexible, allowing you to insert your company's name, address, and other relevant information. You can modify clauses to reflect your unique business practices and legal requirements.

Is the Personal Technology Usage Policy compliant with laws and regulations?

The legal contract templates are written by legal professionals and designed to comply with current laws and regulations at the time of their writing. However, laws can vary by jurisdiction and change over time, so it's recommended to have your contract reviewed by a local attorney to ensure it meets all legal requirements specific to your region and industry. Templates are licensed as self-help information and not as legal advice.

Can I use the same Personal Technology Usage Policy for different clients or projects?

You can use the same Personal Technology Usage Policy for different clients or projects. The templates are versatile and easily adapted for various scenarios. You will need to update specific details such as client names, project descriptions, and any unique terms for each new agreement to ensure that each contract accurately reflects the particulars of the individual client or project.

What should I do if I encounter a clause or term I don't understand?

If you encounter a clause or term in the Personal Technology Usage Policy that you need help understanding, you can refer to guidance notes explaining each section's purpose and use. For more complex or unclear terms, it's advisable to consult with a legal professional who can explain the clause and help you determine if any modifications are necessary to suit your specific needs.

How do I ensure that the Personal Technology Usage Policy is legally binding and enforceable?

To ensure that the Personal Technology Usage Policy is legally binding and enforceable, follow these steps:

  • Complete all relevant sections: Make sure all blanks are filled in with accurate information.
  • Include all necessary terms and conditions: Ensure that all essential elements, such as payment terms, deliverables, timelines, and responsibilities, are clearly defined.
  • Signatures: Both parties must sign the contract, and it is often recommended that the contract be witnessed or notarized, depending on the legal requirements in your jurisdiction.
  • Consult a legal professional: Before finalizing the Personal Technology Usage Policy, have it reviewed by an attorney to ensure it complies with applicable laws and protects your interests.

Proposal Kit LogoPublished by Proposal Kit, Inc.

Disclaimers

Proposal Kit, Inc. makes no warranty and accepts no responsibility for the suitability of any materials to the licensee's business. Proposal Kit, Inc. assumes no responsibility or liability for errors or inaccuracies. Licensee accepts all responsibility for the results obtained. The information included is not legal advice. Names in use cases have been fictionalized. Your use of the Personal Technology Usage Policy template and any purchased packages constitutes acceptance and understanding of these disclaimers and terms and conditions.

© 1997 - 2024, Proposal Kit, Inc. All rights reserved. Privacy Policy.