The computer network is the property of Northview Church and is intended for staff and volunteer use for legitimate business and ministry purposes. Users are provided access to the computer network to assist them in the performance of their ministry-related tasks. All users have a responsibility to use Northview’s computer resources and the internet in a professional, lawful and ethical manner. There is no expectation of privacy for employees using our computer network, which may be accessed by Northview Church.
Northview Church has set a standard of applications that are utilized throughout the organization. These applications are owned and administered by the Northview Church IT department and all data stored within these applications is owned by Northview Church. Users are expected to store all Northview data and information in approved locations or applications (e.g. Microsoft OneDrive, Microsoft SharePoint), failure to do so may result in data loss.
Network security should always be taken seriously. Frequent attacks on a network can result in loss of data and resources. Therefore, users have a responsibility to themselves and to fellow staff members to protect the information within their organization and implement appropriate security measures. If you encounter an issue that is not covered in this information, please consult the IT Department.
Electronic media cannot be used for knowingly transmitting, retrieving, viewing or storing any communication that is: discriminatory or harassing, derogatory to any individual or group; obscene, sexually explicit or pornographic; defamatory or threatening; in violation of any license governing the use of software or engaged in for any purpose that is illegal or contrary to Northview Church’s policy or interests.
Employee communications transmitted by the company systems are not considered private. Northview has the right to access, monitor, inventory, review, audit, delete, and disclose, with or without notice, for any reason, including time and content, all information sent, communicated or stored on company systems, whether or not they are communications. Additionally, routine system maintenance or trouble-shooting by system administrators may result in electronic messages being accessed.