Guidelines and Best Practices
Find what you need, right when you need it. Yammer seamlessly enables connections to people and information across your organization that you never knew existed, making it easier to move your work forward.
1 INTRODUCTION……………………………………………………………………………………………………….……..2
1.1 Purpose Of The Guidelines and Best Practices document……………………………………2
1.2 Lennar IT Communication Policies ……………………………………………………………………………2
2 HELPFUL TIPS FOR USING YAMMER ……………………………………………………………………….….……3
2.1 Subscribing to Yammer Digest ………………………………….………………………………..….…...3
3 PROHIBITED USE AND CONSEQUENCES OF VIOLATION…………………………………….................3
APPENDIX A: Acceptable Use of Information Technology …show more content…
Introduction
Yammer is a Microsoft private social networking service which offers various collaboration tools to help employees connect with others within the Organization. This workspace allows you and your teams to discuss project timelines, share files and gather feedback as needed.
1.1. The purpose of the Guidelines and Best Practices document.
This document outlines the Use and self-governance tips for associates utilizing the platform in a professional …show more content…
It is important that these resources be used in an appropriate, responsible, and ethical manner, and that guidelines be in place such that Lennar, its associates and customers are protected against improper usage.
Effective security is a team effort involving the participation and support of every Company associate who deals with information and information systems. The Company has a fiduciary and corporate responsibility to secure and protect information within our information technology systems. It is the responsibility of all associates to know and understand these guidelines, and conduct activities accordingly.
2 Scope
This policy applies to all Company associates, contractors, and business partners who access and use any Company systems, applications, and data. This policy applies to all data and information within the Company’s possession or control. This includes paper, electronic or other forms of technology used to handle, process, or store information during its lifecycle. This policy also applies to all activities that utilize any company paid accounts, subscriptions or other information technology services such as internet access, voice mail and e-mail. Use of these accounts is not limited to activities conducted within