E-Mail SOP: Document Name: Email SOP Prepared By: Issuance Date
E-Mail SOP: Document Name: Email SOP Prepared By: Issuance Date
E-Mail SOP: Document Name: Email SOP Prepared By: Issuance Date
Purpose
GFG e-mail services support the operational activities of the organization and serve as a means
of official communication by and between users and GFG. This is to ensure that these critical
services are available, safe and secure, and reliable from end to end.
Scope
This E-mail SOP applies to all employees of the GFG who are entitled to email services.
Ghulam Faruque Group uses Email for its official communications through which IT-Admins can manage
all hosting services of a certain domains, the proper and acceptable use of the email server should be
maintained at all times. The email server exists for the purpose of providing written communication
between GFG staff and its stakeholders and is a primary means of disseminating important information
within the organization.
This document defines eligibility to possess a server account, the procedures for requesting a new
account, acceptable use, proper etiquette, and account expiration, ownership of data within the email
server, associated password policies, privacy, spam, document archival and the use of outside email
servers.
2. Privacy
The email server is owned and operated by GFG IT Department. GFG has right to monitor emails in
the SERVER. GFG may inspect the contents of any individual or group mailbox.
Email should be considered a postcard sent in the public mail. The information is delivered to the
addressee but can be read at any time in transit or after delivery.
3. Acceptable Use/Abuse/Etiquette
It is important that our communications:
are respectful in tone
are consistent across our employees, programs and offices
Comply with GFG IT policy about confidential information; acceptable use of technology; use of
GFG resources for political activities, etc.
2
Page
By ensuring our communications meet these standards, GFG employees will convey a professional
image, ensure efficient and accurate responses, and prevent misunderstandings and even legal
problems. These guidelines have been created to assist employees in ensuring emails rise to these
standards.
Name of employee
Designation – Company
E: abc.xyz@gfg.com.pk
W: www.gfg.com.pk
Disclaimer: This email (including any attachments) is confidential and intended for the recipient specified in message only. It is strictly
forbidden to disseminate any part of this message to a third party without the prior written consent of the sender. If you ha ve received
this message in error, please notify the sender by return email and delete the message from y our system.
3
Page
4. Account Term/Expiration
Regular Employees: Access to the SERVER is available while the employee remains a Regular Employee
and is revoked upon resignation, retirement or release from GFG.
Exceptions: The IT may grant a later account expiration, only with the approval of senior management,
to meet the business needs of GFG.
5. Data Ownership
All email, files, attachments, calendar entries and task items are the exclusive property of GFG. The
bulk release of any data from the SERVER requires approval from management. No data is
transferable to any former employee upon separation from GFG.
7. Password Procedure
GFG email account is a valuable asset that uniquely identifies each employee. The password used to
access the SERVER should be kept private to safeguard one’s identity and privacy and should not be
shared.
The SERVER requires a strong password that meets the following criteria:
It must be a minimum of seven (8) characters
It must contain three (3) of the following types of characters:
o Uppercase letter
o Lowercase letter
o Numeral
o Non-alphanumeric characters (%, !, &, etc.)
4
Page
8. Spam
Email spam, also referred to as junk email or simply SPAM, is unsolicited messages sent in bulk by
email. The Spam is ubiquitous, unavoidable, and repetitive
9. Phishing
Scammers research the target organization and its suppliers. This research may send emails with links
to ‘phish’ for information, install spyware on the recipient’s computer or infiltrate their wider
network.
The scammers then pretend to be a supplier who has carried out work or provided products for the
organization. They ask for a change to the payment process and supply alternative bank account
details for the money to be transferred to. The new account actually belongs to the scammers. If you
receive an email from a supplier seeking a change to the bank account details you use to pay them,
be suspicious!
Call the sender to confirm the authenticity of the request and the account details. Use previously
known contact numbers or the correct, verified number from the supplier’s website. It is vitally
important not to use contact details contained in the email as they may be fake and put you in touch
with the scammers instead of the supplier.
When responding to emails, use the forward button instead of reply, and manually type or select the
address from your address book. This will help you make sure you are communicating with a known
contact.
10.Quotas
At present, the SERVER enforce quotas governing the maximum size of 1 GB any mailbox. However,
the quota can be increased with approval of management.
5
Page
11.Attachments, Viruses and Malware
The SERVER can receive attachments up to twenty-five (25) megabytes in size.
The SERVER blocks the delivery of files with filename extensions that pose a significant risk to GFG
servers. These files often hide viruses.
The SERVER scans all incoming email for viruses and other malware threats. However, new threats
are discovered hourly and there is no guarantee that every scanned file is truly virus free. Users should
not open attachments that are suspicious or unexpected. Many virus infected email is delivered from
accounts a user may recognize. Users should attempt to verify with the sender of the legitimacy of an
unexpected attachment before opening the file(s.)
If a user of the SERVER inadvertently opens a suspicious file or web site link, the user should contact
the IT support immediately to report the incident and to initial removal of any infection.
Once reported, harmful email may be deleted by server administrators through the entire SERVER to
preserve the integrity of the SERVER.
Access to the SERVER will be provided to an authorized employee under the following conditions:
The employee agrees to configure his/her activated wireless communication device(s) to require
password access. To maintain GFG network security, employees are discouraged from saving
passwords in the email configuration of the device.
The employee agrees to notify IT Department immediately in the event of loss or theft of his/her
activated wireless communication device(s).
6
Page