Lunr Management Model and Employee Handbook
  • πŸ‘‹Welcome to LUNR!
  • About us
    • πŸš€Vision, Mission & Focus
      • Vision
      • Mission
      • Pillars
  • How We Make Decisions
    • πŸš€Strategy
      • Context, not control
      • Strategic management
      • Culture code
    • 🏹Leadership
      • Managers
      • Tech leads
      • Traits of leadership
      • Leaders Performance
    • πŸ‘­Team management
      • Team Structure Designed for Success
      • Embracing Effective Ceremonies
      • Strategic Sessions: Empowering Innovation
  • How we build processes and a great product
    • βš™οΈOperations and roles
      • How We Navigate Growth and Complexity
      • Our Responsibility Assignment Matrixes: RACI & CODE-KS
    • πŸ“šKnowledge management
      • Knowledge Categories
      • Knowledge Accountability Index
      • Confluence
      • Learning day
      • Company Knowledge Centricity Level
      • Realms
    • πŸ‘¨β€πŸ’»Engineering culture
      • Engineering culture
      • Team culture
      • Engineering Process and Roles
      • Team Events and Processes
        • Scrum Events
        • Ongoing Meetings
        • Concepts
  • How we ensure people’s growth
    • πŸ“ˆPerformance
      • Paths
        • Individual Contributors Path
          • Individual Contributors Levels - Software Engineering
          • Individual Contributors Steps
        • Management Path
          • Level 1 - Our Pace setters
          • Level 2 - Our Coaches
          • Level 3 – Our visionaries and servant leaders
          • Level 4 – Our transformational leaders
          • Key concepts
      • Performance evaluation
      • 360 Evaluation Matrix
      • K-POC
      • CAP
      • Management Model Golden Rules
    • πŸ’°Compensation
      • IC Frameworks
        • πŸ‘¨β€πŸ’»Android Development
        • πŸ“±Android OS Development
        • πŸ”Assets security
        • πŸ‘¨β€πŸ’ΌBusiness Development
        • πŸ“§Digital marketing
        • πŸ’»Front-end web development
        • ⌨️Full Stack Web Development
        • 🏒Facility cleaning
        • πŸ”‘Information security
        • ↗️Marketing automation
        • 🐞QA automation
        • πŸ‘ΎQuality assurance
        • 🧍Recruiting Operations
        • πŸ“–Technical Training
        • 🀦Technical recruitment
        • πŸ€–WordPress Developers
        • πŸ‘©β€πŸŽ¨UX/UI
      • MGT Frameworks
        • πŸ‘¨β€πŸ’»Application support management
        • βž—Accounting&Finance Management
        • πŸ‘―HR Operations Management
        • πŸ”’Information Security Management
        • πŸ“§Marketing Management
        • πŸ“žNOC&Support management
        • 🚡Operations management (logistics)
        • πŸ€¦β€β™€οΈOperations management (administration)
        • πŸ–₯️Product owner
        • πŸ”©Product Engineering Management
        • 🀝Product Marketing Management
        • πŸ‘¨β€πŸ’ΌProject Management (Business)
        • πŸ‘¨β€πŸ’»Project Management (Software)
        • πŸ›’Sales Management
        • πŸ“³Software Engineering Management
        • 🌟Strategic Business Development Management
        • πŸ’ŸStrategic Human Resources Management
        • 🚟Supply Chain Management
        • πŸ‘ŒTechnical Account Management
        • ☎️Technical Support Management
        • πŸ“œTechnical Training Management
    • 🌟Empowering Growth through Transparent Management: Your Path to Success
  • Policies
    • 🎹Internal rules
      • Employee Probationary Period
      • Employee Code of Conduct
      • Physical Access Control
      • Cybersecurity and digital devices
        • Internet usage
        • Cellphone
        • Corporate e-mail
        • Social media
        • Conflict of interest
        • Workplace measures
        • Employee relations
        • Solicitation and Distribution
      • Substance Abuse and Drug Testing Policy
      • Employee Attendance and Working Hours Policy
      • Shiftwork Policy
      • Overtime policy
      • Employee Time Off Policy
      • Remote office policy
      • Smoke-free office policy
      • Employee Referral Program Policy
      • Moonlighting Policy
      • Anti-discrimination Policy
      • Violence In The Workplace Policy
      • Workplace Harassment Policy
      • Source Code Policy
      • Data Protection and Privacy Policy
      • Employee Confidentiality Policy
      • Business Trips Policy Policy
      • Company Equipment Policy
      • Event Participation Policy
      • Training Benefit Policy
      • Termination of Employment Policy
      • Disciplinary Action Policy
      • Corrective Action Plan (CAP) Policy
    • πŸ’΅Salaries
    • πŸ“–LUNR knowledge
    • πŸ§™Sources
    • πŸ“‘Glossary
  • ©️License
Powered by GitBook
On this page
  1. Policies
  2. Internal rules
  3. Cybersecurity and digital devices

Cellphone

Policy elements

We allow the use of cell phones at work. Personal phone use is allowed for not more than 2 mins. This is to make sure you can take phone calls in case of an emergency related to your family. You must not get distracted from your work. You must not disturb the other people in the room by making personal phone calls. You need to always make them on your break. Employees use company-issued phones for business purposes only and preserve them in perfect condition.

We won’t allow employees to:

  • Play games on the cell phone during working hours.

  • Use their cell phone’s camera or microphone to record confidential information.

  • Use their phones in areas where cell use is explicitly prohibited

  • Speak on their phones within earshot of colleagues’ working space during working hours.

  • Download or upload inappropriate, illegal or obscene material on a company cell phone using a corporate internet connection.

Policy Violation

Our company will monitor employees for excessive or inappropriate use of their cell phones. If an employee’s phone usage causes a decline in productivity or interferes with our operations, we’ll ban that employee from using their cell phones during working hours and the following action will be taken:

  • Disciplinary action: if a minor violation

  • Termination of Employment: if a severe violation

Examples of severe violations are:

  • Cause a security breach.

  • Violate our confidentiality policy.

PreviousInternet usageNextCorporate e-mail

Last updated 11 months ago

🎹