7. Monitoring of Use

7. Monitoring of Use

Computers, email, the Internet, mobile phones and fixed landlines are installed expressly for the purpose of supporting the work of Key.  In most instances, their use is automatically recorded.  Key will routinely monitor the use of the communication methods covered by this policy statement.

This may be done by, but not limited to, accessing billing information, computer logs and mailbox contents.  Among the reasons for this monitor are:

  • Detecting viruses.
  • Prevention of unauthorised access to Key’s systems.
  • Inappropriate use of the Internet or email as defined by this policy.
  • Detecting unusual trends in use of Internet or email services.

All email messages sent or received via Key’s email address are the property of Key and can never be considered private for the purpose of monitoring/auditing.  Monitoring of email messages may be carried out by ICT staff or senior and line managers.