1. Employee Records
1.1. Employee Hire Records
1.2. Hourly Employee Manual
1.3. Salaried Employee Manual
1.4. Supplemental
1.4.1. Understanding Annual W-2
1.4.2. Designated Beneficiary
1.4.3. Contract Employees
2. Payroll Processing -Policies
2.1. Time in a Box Clock
2.2. Salaried Policy & Procedures
2.3. Departments
2.4. Employment Termination
3. Employee Benefits
3.1. Voluntary Employee Insurance
3.2. Cafeteria Plan (IRC Section 125)
3.3. Savings Program
3.4. Garnishments
3.5. 401K Program
• Pension Protection Act of 2006
3.6. Charities
4. Employee Safety
4.1. Policies
4.2. Substance Abuse
4.3. Mandated Documentation
4.3.1. First Injury Report
4.3.2. OSHA Log
4.3.3. Worker’s Right to Know Act
4.4. Worker’s Compensation
4.5. Safety Committee
5. Records
5.1. Government Poster Requirements
5.2. Maintenance of Short-Term Documents
5.3. Archive Maintenance
COMPANY INTRANET
ePOLICY
The Company provides employees with access to it’s network and the Internet for the conduct of its
business and expects appropriate and lawfully use. Violation of the following Policy may be subject to
disciplinary action, including termination and/or civil prosecution.
Employees should report any misuse to the General Manager.
PURPOSE AND USE
Our networks have confidential and proprietary
information about the Company, our employees,
customers, and suppliers. Employees may not
exchange or remove this information from company
premises, such as by electronic or other copy, or by
transfer via the internet. Copying or backing up any
business information to bulk storage, such as USB
drives or CD/DVD automatically surrenders that
device to company property.
Employees should limit their access to the Company
networks, including the Internet for business pur-
poses only. If in doubt, s/he should ask the General
Manager. The Company determines what files,
communications, materials, information, software,
and other content and activity are permitted or
prohibited.
Company failure to take disciplinary action against
any non-business use of its information systems
does not imply acceptance of that use or limit its
ability to take future actions.
PRIVACY
The Company reserves the right to monitor, inspect,
copy, review, and store at any time and without prior
notice any and all usage of its network and access
to the Internet, as well as any and all materials, files,
information, software, communications, and other
content transmitted, received, or stored in
connection with this usage.
Without exception all such information, content, and
files are the property of the Company. Network
administrators may review files and intercept
communications for any reason, including but not
limited to maintaining system integrity and ensuring
employees are using the system consistently with
this Policy.
Employees may personalize their workstations from
time to time with pictures on screen savers and
monitor wall-paper. Such images must never be
offensive to fellow associates.
The following activities violate the Company’s usage Policy and may lead to
disciplinary action
(A) Using, transmitting, receiving, or seeking inappropriate,
offensive, vulgar, suggestive, obscene, pornographic,
abusive, harassing, belligerent, threatening, defamatory, or
misleading language or materials, including ethnic, sexual-
preference, or gender-related slurs or jokes.
(B) Revealing another employee’s personal information,
such as the home address, telephone number, or Social
Security number, wages, medical records, etc.
(C) Engaging in illegal activities or encouraging others to
do so, such as
1. Downloading or transmitting the organization’s
confidential information or trade secrets.
2.Using software that is not licensed or approved by the
Company.
3.Downloading or transmitting copyrighted materials
without permission from the copyright holder.
(D) Wasting the Company’s computer resources, such as
sending electronic chain letters, personal social networks
(E) Causing harm or damaging others’ property, such as:
1.Accessing, transmitting, receiving, or seeking
unauthorized, confidential information about customers or
colleagues.
2.Accessing others’ folders, files, work, networks, or
computers. Intercepting communications intended for
others.
3.Using another employee’s password to trick recipients
into believing someone other than you is communicating
or accessing the Network or Internet.
4.Uploading a virus, harmful component, or corrupted
data. Vandalizing the Network.
(F) Jeopardizing Network security by disclosing or sharing
passwords and/or impersonating others.
(G) Engaging in non-Company related commercial activity,
such as selling, buying, soliciting, or advertising goods or
services, such as on eBay.
Human Resource > ePolicy