At Work: Good Email, Internet, and Computing Habits

As an employee at your institution, youâre a cog in the great wheel that makes everything run. Youâve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you permission to access and use for your work. Hereâs some things to remember when using your institutionâs computer systems, email, and Internet access.

See Also: Live Webinar | Empowering Your Human Firewall: The Art and Science of Secure Behavior

Use Your Common Sense When Emailing

You are someone@yourinstitution.com. Everything you write and respond to reflects you and your position. Itâs all about how you behave. Use common sense and professionalism when responding to any email, both external and internal to your institution. Imagine your Mother looking over your shoulder as you type the email. Ask yourself, â-What would my Mother do/say about this email?â" Would she tsk-tsk you and tell you to rewrite it? Writing good email isnât easy, and youâll want to remember that many times people can misconstrue or misunderstand what youâre trying to say. Being a savvy Internet and email user can reflect on your professionalism, and also reflect on your institutionâs reputation.

Rules to Surf By At Work

On the Internet at work? You use the Internet to do a good bit of research, check on an order you made for your institution, and youâre very adept at navigating your way on the Internet. Youâve worked hard, so why not browse on the Internet during your lunch break or send out a few personal emails on your personal email account? Hereâs some rules youâll want to keep in mind, whether or not your institution has a written policy, these are some â-What Would My Mother Do/Say?" Rules to email and surf by while youâre at work.

Keep Personal Email Personal

Limit your personal email usage. Youâre on your institutionâs systems, and even though itâs just one or two emails, do the math, if everyone of your fellow employees read or sent one or two emails per day outside of their work parameters, well, you see where this is going.

Whoâs Watching You?

Itâs not your computer. Donât expect any privacy in your email or other electronic messages. This includes instant messaging. Your institution has probably already stated somewhere in its policies or employee handbook that there is no expectation of privacy. Think your emails go unnoticed or unread? Think again. Your institution doesnât have to tell you it is reading your emails because those emails are really owned by them.

Keep It Work-Related

Monitoring may happen, and probably will, financial institutions are under the eye of banking regulators, so you should expect all of your work to be visible, including your work done electronically. Your institution may monitor your electronic communications, if it deems it necessary. So again, youâll want to remember keep it all work related.

Speak Up On Your Suspicions

Experiencing a slow-running computer or had a weird phone call where the caller asked you questions about your work, co-workers, or things that arenât public? Pick up the phone and report suspicious incidents to the proper department (usually the information security department) at your institution. If youâre not sure what department to contact, ask your supervisor. If you see someone, a co-worker or another employee doing something out of the ordinary, make a note of it and report it to the proper department.

Donât just sit there silently. If the IT hits the fan later, the trail may lead back to you. Better to be a Chicken Little than not speak up. The faster you respond, the faster your information security team at your institution can stop whatever is happening.

The Hard And Fast Rules

Know the rules and expectations of your institution. Whether you joined your institution 20 years ago or just last month, the same rules apply. If you violate the rulesâ... your employment could be terminated. Donât know what the rules are? Be sure to ask, and know what is allowed, and what is not allowed.

Do Nothing To Offend

Your professionalism is reflective of your institution. So no offensive jokes, or anything else that fails the â-What Would My Mother Do/Sayâ" Rule. If itâs offensive to others, you canât do it, not at your institution or on its computer systems or telephone.

Get The Hack Out Of Here

For those employees who are curious about viruses or think they would like to see what the â-bad sideâ" of the Internet looks like, donât do it at work. Do not visit â-hackerâ" sites or download any software that isnât approved by your institutionâs Information Technology department.

No Other Business At Work

Your friend in accounting does tax returns as a side job during tax season, and he uses his workstation to store some of the tax returns heâs completed. Following your friendâs example, youâre thinking of putting together a gift basket business and run it out of your house. Youâve been using your institutionâs computer to put together some of the pages and store the photos for your brochure. This is not something youâll want to do, unless you donât want to work at your institution in the future. Do not even think about running any sort of non-business on your institutionâs networks.


About the Author

Linda McGlasson

Linda McGlasson

Managing Editor

Linda McGlasson is a seasoned writer and editor with 20 years of experience in writing for corporations, business publications and newspapers. She has worked in the Financial Services industry for more than 12 years. Most recently Linda headed information security awareness and training and the Computer Incident Response Team for Securities Industry Automation Corporation (SIAC), a subsidiary of the NYSE Group (NYX). As part of her role she developed infosec policy, developed new awareness testing and led the company's incident response team. In the last two years she's been involved with the Financial Services Information Sharing Analysis Center (FS-ISAC), editing its quarterly member newsletter and identifying speakers for member meetings.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.