Monitoring and Use of Internet

The company’s network and online services like email are at all times the property of the company. By accessing the system and services, you acknowledge that the company may, from time to time, monitor, log, and collect statistics on your activity and may examine all individual devices and communications. This helps the company protect its rights by limiting the damage that could be caused by your use of the company’s resources. Please read this section carefully and feel free to talk to your immediate supervisor if you disagree with any of the terms.


Please note that the company uses email and content filters to block spam and computer viruses. These filters may, from time to time, block legitimate email messages that should have reached you. The company may monitor the currently running applications and network connections on your work device to prevent misuse of the work machine for running illegal software. The company may also track your activities during working hours manually or by using surveillance devices and keep the records in the file as a measure to prevent misuse and make decisions about your contract terms. Please rest assured, the information will never be made available to anyone outside the company. But remember, the collected recordings, logs, and other information may be shared with law enforcement, or third parties for forensic and similar services if required by the law, or to investigate an alleged misuse.

While we don’t monitor your personal devices, we may collect identifying information when your personal devices are connected to the company’s network. Such information will be treated in the same way we treat the information collected from office equipment. Our Privacy Policy explains in detail what information we collect when you use the services operated by the company.

Using the Internet Connection

Access to the Internet is the principal of our work. You should not abuse the internet or internet-enabled devices in a way that affects the regular operations of the company. You will solely be responsible for any kind of harm done, the damage created, or liability incurred to you, the company, or a third-party by your use of internet access. That means you are supposed to use the provided facility ethically and use the necessary steps to make sure you don’t indulge in any cybercrime or objectionable activities.

You must not share live audio-visual of your workspace, or send any text that describes the ongoing project of the company, or share screenshots, screen sharing, or similar software without prior permission of your immediate supervisor.

Do not download or distribute inappropriate and illegal content.

You may not access, download, or distribute content deemed illegal by government bodies. You should not try to circumvent any protection or censorship applied by the company or the government body to access such content. You should not access, download, or distribute information related to illegal weapons, controlled substances, and references to pornographic, discriminatory, harassing, or incitement to violence.

Do not use the company’s network for inappropriate personal gain.

You can access educational or training content using the company’s internet connection. We allow incidental and occasional personal use of the internet connection during office hours. But you are not allowed to download any kind of copyrighted, illegal, and pirated content for personal use using the company’s devices or network. You should not use the company’s network connection and credentials to access content that would not be otherwise available.

You will be personally liable for your use of the internet.

You must not download or share pirated software and illegal using the company’s network. You will be personally liable for any consequences that may arise due to the use and distribution of pirated software, including legal actions from the law enforcement agencies, and payment of fines.

Use of Copyrighted Content

You must respect and comply with copyright laws and intellectual property rights of both the company and other parties at all times. The company has licenses to use third-party content provided by a number of vendors. You can ask our content manager, or our graphics designer if you need anything for your work. While using any other resources, you must provide appropriate attribution and citation of the source in your work.

Please read this section carefully, and ask your supervisor if you don’t understand something.

Do NOT download or use copyrighted content.

Do NOT use third-party copyrighted content such as icons, photos, illustrations, audio, video, text, etc. in your project. When you are working on a project, you must not arbitrarily download and use content from the internet. You must only use the content created by the company even if the project is under development. In some rare cases where you must use third-party content, you must also make a list of copyrighted content you downloaded from the internet. You must make sure such content is replaced by the content created by the company as soon as possible, before publishing the project.

If you are found including third-party copyrighted content in your projects without making a complete list of such content in the project’s README or the project’s Wiki section, your supervisor may take disciplinary actions against you, and this will heavily impact your performance review results.

If you have a habit of copying code from StackOverflow or programming books as everyone else supposedly does, please stop. Do not copy code from online forums. You should read the question, the accepted answer, other answers, and the comments to fully understand the problem and write that code yourself. You can instead put a link to the answer in the code’s comment. Remember, you should NOT copy the code. If it’s trivial, write it yourself. If it’s not trivial, it’s learning time.

If you are found to have included a copied code in your project your supervisor may take disciplinary actions against you, and this will heavily impact your performance review results. Once again, do not copy code from online forums and books.

The reason you should not copy such code is that we do not have a license to use that code for commercial purposes.

Only use licensed third-party code.

You should not use any unlicensed code (code snippets, libraries, and SDK) you find on the internet. Unlicensed code is any code that does not have a LICENSE file included with it. You should always make sure the third-party code that you need to use includes a LICENSE file. Your use of the code must comply with the terms set on the license, so please check carefully before you use such copyrighted code.

Do NOT use any software that is available under the GNU General Public License (GPL) and similar licenses that mandate the changes to be made publicly available. You must not use third-party software such as libraries, SDKs, or codes that do not include any of these licenses: MIT, Apache, BSD, and FreeBSD. When in doubt, always ask for permission from your supervisor. Always make a list of included third-party code, along with the source URL in the project’s README file and the project Wiki. May it be a link to a GitHub repo, gist, or answer on forums like StackOverflow and Reddit, make a note of it in the project’s README file.

If you are found to have included an unlicensed third-party code in your project or used any licensed code without mentioning it in the project’s README and Wiki, your supervisor may take disciplinary actions against you, and this will heavily impact your performance review results.

Always give credit to the authors.

When you use open-source software (libraries, SDKs), you must include a link to their license file in your source code. You must also include the name, author, and license text of each software in the Open Source Licenses section of the product that you are making. When you use copyrighted content that requires attribution, you must include the attribution as required by the author, or the content provider. If the content provider sets any kind of requirement, such as linking back to their website or mentioning the source in the Credits section of your work, you must comply with such a requirement. Some examples:

  1. If you are displaying a photo downloaded from Unsplash, you must write the recommended attribution text under the photo wherever you use it, which may include the name of the photographer, and a link back to the page on Unsplash’s website.
  2. If you used an excerpt from Wikipedia on the website, you must include a citation that the content was copied from Wikipedia, and put a link to the source article, and then indicate if you made any changes to the content.
  3. If you used a software library or piece of code from Github in a product, you should put the project’s title, author’s name, an excerpt of the license, and a link to the project on the Open Source Licenses page of the product.

If you are found to have included a copyrighted content without attribution, your supervisor may take disciplinary actions against you, and this will heavily impact your performance review results. Once again, do not forget to give credit to the authors; they deserve it.

Using the Email, Telephone, and Social Media

You are granted access to the company’s email and telephone services. You are required to use the services wisely and for lawful purposes only.

Company’s Email System

You should use the email service to send and receive emails within or outside the company for work-related communication. The email system is the property of the company and is subject to monitoring. Your use of the email service is subject to occasional review by the company. All of the messages are kept in archives to comply with the records retention policy of the company.

Please do not sign up for non-work-related services using the company’s email address. In the past, people have used the company’s email for signing up for anonymous email services and social media. Don’t do that.

Company mail is like any other form of communication. We don’t tolerate any harassment or unlawful acts or violation of any terms of this handbook using the company email system. Remember that when you send an email from the company’s email, you represent the company whether your message is business-related or personal. You are not allowed to use company email for personal work. Just like the internet usage, you will be solely responsible for the use of the email service provided to you.

Company’s Telephone Line

You can use the company telephone with the permission of the Operations Manager. The receptionist is exempt from this restriction; however, using the telephone for personal use is not allowed unless an emergency.

Use of Social Media

Social media includes all means of communicating or posting information or content of any sort on the Internet, including to your own or someone else’s weblog or blog, journal or diary, personal website, social networking or affinity website, web bulletin board, or a chat room, whether or not associated or affiliated with the company, as well as any other form of electronic communication.

Any conduct that adversely affects the performance of your coworkers, or affects the company’s business interests, may result in disciplinary action that leads to termination. Similarly, unauthorized posting, discriminatory remarks, the issues of harassment, violent threats, offensive, and unlawful conduct is not tolerable. It includes all the above but not limited to the area of concern within these areas. They may result in disciplinary action, up to and including termination.

When you are creating content or engaging in a conversation about the company’s business, products, employees, contractors, partners, or service providers in social media, you must disclose your affiliation with the company. You must also clearly indicate that your views are your personal, not of the company. Engaging in social media in content related to the company, without proper disclosure, may lead to disciplinary action that leads to termination.

Violation of Policies

In all circumstances, the use of internet access and email systems must be consistent with the law and this handbook. Violation of the terms regards as a severe offense and may result in a range of sanctions, from disciplinary action to termination. Violating any of these policies, including any policies in this handbook, will be considered a violation. The punishment may lead to termination, and if the legal case arises, you will be fully responsible for paying for the lawyer’s fees and damage.

Previous Calendar and Leave Policy
Next Onboarding the Team
Table of Contents