Lunr Management Model and Employee Handbook
  • 👋Welcome to LUNR!
  • About us
    • 🚀Vision, Mission & Focus
      • Vision
      • Mission
      • Pillars
  • How We Make Decisions
    • 🚀Strategy
      • Context, not control
      • Strategic management
      • Culture code
    • 🏹Leadership
      • Managers
      • Tech leads
      • Traits of leadership
      • Leaders Performance
    • 👭Team management
      • Team Structure Designed for Success
      • Embracing Effective Ceremonies
      • Strategic Sessions: Empowering Innovation
  • How we build processes and a great product
    • ⚙️Operations and roles
      • How We Navigate Growth and Complexity
      • Our Responsibility Assignment Matrixes: RACI & CODE-KS
    • 📚Knowledge management
      • Knowledge Categories
      • Knowledge Accountability Index
      • Confluence
      • Learning day
      • Company Knowledge Centricity Level
      • Realms
    • 👨‍💻Engineering culture
      • Engineering culture
      • Team culture
      • Engineering Process and Roles
      • Team Events and Processes
        • Scrum Events
        • Ongoing Meetings
        • Concepts
  • How we ensure people’s growth
    • 📈Performance
      • Paths
        • Individual Contributors Path
          • Individual Contributors Levels - Software Engineering
          • Individual Contributors Steps
        • Management Path
          • Level 1 - Our Pace setters
          • Level 2 - Our Coaches
          • Level 3 – Our visionaries and servant leaders
          • Level 4 – Our transformational leaders
          • Key concepts
      • Performance evaluation
      • 360 Evaluation Matrix
      • K-POC
      • CAP
      • Management Model Golden Rules
    • 💰Compensation
      • IC Frameworks
        • 👨‍💻Android Development
        • 📱Android OS Development
        • 🔐Assets security
        • 👨‍💼Business Development
        • 📧Digital marketing
        • 💻Front-end web development
        • ⌨️Full Stack Web Development
        • 🏢Facility cleaning
        • 🔑Information security
        • ↗️Marketing automation
        • 🐞QA automation
        • 👾Quality assurance
        • 🧍Recruiting Operations
        • 📖Technical Training
        • 🤦Technical recruitment
        • 🤖WordPress Developers
        • 👩‍🎨UX/UI
      • MGT Frameworks
        • 👨‍💻Application support management
        • ➗Accounting&Finance Management
        • 👯HR Operations Management
        • 🔒Information Security Management
        • 📧Marketing Management
        • 📞NOC&Support management
        • 🚵Operations management (logistics)
        • 🤦‍♀️Operations management (administration)
        • 🖥️Product owner
        • 🔩Product Engineering Management
        • 🤝Product Marketing Management
        • 👨‍💼Project Management (Business)
        • 👨‍💻Project Management (Software)
        • 🛒Sales Management
        • 📳Software Engineering Management
        • 🌟Strategic Business Development Management
        • 💟Strategic Human Resources Management
        • 🚟Supply Chain Management
        • 👌Technical Account Management
        • ☎️Technical Support Management
        • 📜Technical Training Management
    • 🌟Empowering Growth through Transparent Management: Your Path to Success
  • Policies
    • 🎹Internal rules
      • Employee Probationary Period
      • Employee Code of Conduct
      • Physical Access Control
      • Cybersecurity and digital devices
        • Internet usage
        • Cellphone
        • Corporate e-mail
        • Social media
        • Conflict of interest
        • Workplace measures
        • Employee relations
        • Solicitation and Distribution
      • Substance Abuse and Drug Testing Policy
      • Employee Attendance and Working Hours Policy
      • Shiftwork Policy
      • Overtime policy
      • Employee Time Off Policy
      • Remote office policy
      • Smoke-free office policy
      • Employee Referral Program Policy
      • Moonlighting Policy
      • Anti-discrimination Policy
      • Violence In The Workplace Policy
      • Workplace Harassment Policy
      • Source Code Policy
      • Data Protection and Privacy Policy
      • Employee Confidentiality Policy
      • Business Trips Policy Policy
      • Company Equipment Policy
      • Event Participation Policy
      • Training Benefit Policy
      • Termination of Employment Policy
      • Disciplinary Action Policy
      • Corrective Action Plan (CAP) Policy
    • 💵Salaries
    • 📖LUNR knowledge
    • 🧙Sources
    • 📑Glossary
  • ©️License
Powered by GitBook
On this page
  1. Policies
  2. Internal rules
  3. Cybersecurity and digital devices

Corporate e-mail

Policy Elements

Corporate emails are powerful tools that help employees in their jobs. Employees should use their company email primarily for work-related purposes. We will define what constitutes appropriate and inappropriate use.

Inappropriate use of company email

Our employees represent our company whenever they use their corporate email address. They must not:

  • Sign up for illegal, unreliable, disreputable or suspect websites and services.

  • Send unauthorized marketing content or solicitation emails.

  • Register for a competitor’s services unless authorized.

  • Send insulting or discriminatory messages and content.

  • Intentionally spam other people’s emails, including their coworkers.

Our company has the right to monitor and archive corporate emails.

Appropriate use of the corporate email

Employees are allowed to use their corporate email for work-related purposes without limitations to:

  • Communicate with current or prospective customers and partners.

  • Log in to purchased software they have legitimate access to.

  • Give their email address to people they meet at conferences, career fairs or other corporate events for business purposes.

  • Sign up for newsletters, platforms and other online services that will help them with their jobs or professional growth.

Email security

Email is often the medium of hacker attacks, confidentiality breaches, viruses, and other malware. These issues can compromise our reputation, legality, and security of our equipment. Employees must always be vigilant to catch emails that carry malware or phishing attempts. We instruct employees to:

  • Avoid opening attachments and clicking on links when content is not adequately explained (e.g. “Watch this video, it’s amazing.”)

  • Be suspicious of clickbait titles.

  • Check the email and names of unknown senders to ensure they are legitimate.

  • Look for inconsistencies or style red flags (e.g. grammar mistakes, capital letters, an excessive number of exclamation marks.)

If an employee isn’t sure that an email they received is safe, they can ask our System Administrators.

Email signature

We encourage employees to use the email signature from Secure Group that exudes professionalism and represents our company well. Employees dealing with sales and executives, who represent our company to customers and stakeholders should pay special attention to how they close emails.

Policy Violation

In case the employee does not follow the Corporate email measures, the following action will be taken:

  • Disciplinary action: if a minor violation

  • Termination of Employment: if a severe violation

Examples of severe violations are:

  • Using a corporate email address to send confidential data without authorization.

  • Sending offensive or inappropriate emails to our customers, colleagues or partners.

  • Using a corporate email for illegal activity.

PreviousCellphoneNextSocial media

Last updated 11 months ago

🎹