Table of Contents Chapter 1: User Accountability Chapter 3: Internet Access
Chapter 2: Electronic Mail

1. Introduction

2. Policy Statement

3. Standards 4. Management’s Right to Access Information

5. Message Content

6. Message Integrity and Disclosure

7. Safeguards of E-mail systems

8. Internet E-mail

9. Other E-mail Considerations

10.Responsibilities

11.References


Introduction

The electronic mail (e-mail) systems provided by or used at True Value Company are intended to assist employees and vendors in carrying out corporate business by facilitating communication between individuals and work groups. The intent of this Policy and its Standards is to address the use of, access to, review, and disclosure of e-mail messages transmitted through True Value's systems.


Policy Statement

Corporate e-mail systems are to be used for True Value related business purposes only. True Value treats all e-mail messages sent, received, and/or stored in its systems as corporate records. Corporate e-mail systems must not be used to continue, distribute, or circulate chain letters and inappropriate/offensive content.

True Value does not assure any personal right of privacy for any e-mail message or document transmitted through the use of corporate equipment or systems. True Value reserves the right to access all e-mail messages transmitted through corporate equipment or systems, without prior notice, and to disclose the message to any person or entity that True Value deems appropriate. True Value retains the right to determine the acceptable use of its e-mail systems.


Standards

Management’s Right to Access Information

E-mail messages are company records. The content of e-mail, properly obtained for legitimate business purposes, may be disclosed within the Company without user permission. Therefore, it should not be assumed that messages are confidential. Backup copies of e-mail messages may be maintained and referenced for business and legal reasons.

The Company may inspect the contents of electronic messages:

Requests to access the content of electronic mail messages must be approved in advance by the Sr. V.P. of Human Resources.


Message Content

The use of e-mail to transmit any message or file whose content violates any True Value Policy or state or federal law is prohibited.

Examples of prohibited use include, but are not limited to:


Message Integrity and Disclosure

Incidental use of the e-mail systems to transmit messages of a personal nature will be treated by True Value no differently than True Value related business e-mail messages.


Safeguards of E-mail systems

Employees are prohibited from the unauthorized use of the password and encryption keys of other employees to gain access to another employee's e-mail messages. Only senior management can authorize such use. Message encryption features of the e-mail system should be enabled when allowed by law.

Local copies of a user's GroupWise mailbox should have the password set. This will prevent somebody from opening the local mailbox without knowledge of the user's GroupWise password. The local mailbox contains a replicated copy of the user's GroupWise mailbox and calendar.


Internet E-mail

The True Value mail system can send and receive Internet mail messages. Unauthorized use of external mail services (examples: AOL mail, MSN mail, CompuServe mail) for company correspondence is expressly forbidden (authorization must be obtained from Information Security in World Headquarters). To use Internet electronic mail appropriately, the following must be done:

E-mail must NOT be used on the Internet to:


Other E-mail Considerations

E-mail and electronic scheduling are excellent tools for communicating, sharing documents, and scheduling meetings. These tools can reduce the time required to share information and enhance business processes. However, information transmitted via e-mail can be vulnerable to a variety of security and confidentiality threats. Additional considerations when using e-mail include:


Responsibilities

Local Area Network (LAN) and e-mail administrators are responsible for:

Department managers are responsible for:

HR Department is responsible for:

User responsibilities are to:


References

See Chapter 6 Access Controls for more information on password security standards.

See Chapter 3 for additional standards related to the e-mail over the Internet.

See Appendix E: Laptop Security for more information on securing PCs and laptops.


Table of Contents Chapter 1: User Accountability Chapter 3: Internet Access