Appropriate Use
All church property and assets are intended to be used for Tenth purposes only. The use of Tenth property and
other assets for personal purposes is not allowed without explicit and documented permission from an employee’s
supervisor or the Administrator.
Technology and Property (Intellectual and Actual)
Technology
1. Internet & Network Connections
Internet and network resources are available to Tenth employees and members for ministry purposes. Access to networks and resources shall be granted by demonstrated need, not by desire. Similarly, access will be revoked whenever a need ceases.
2. Computers & Devices
Computers and other equipment issued by Tenth are the property of Tenth and are to be used for ministry purposes.
You may generally use personal devices for ministry purposes, so long as the data is stored in a Tenth-managed environment, and the required security measures have been implemented. Some Tenth data is not permitted on personal devices including payment processing data and sensitive data about our Global Partners.
If a device with Tenth data is lost or stolen (regardless of whether it’s owned by Tenth or by you) you must report it to the Director of Technology within 24 hours.
3. Content & Use
Employees are prohibited from using the internet, email, or Tenth-owned equipment for any purpose which is illegal, violates Tenth’s policy, or is contrary to the ministry’s interests. These prohibitions include, but are not limited to:
Purposefully accessing online content deemed by Tenth to conflict with Tenth’s interests or federal, state, or local law. Such conflicting content includes online gambling, pornographic or sex-related material, and pirated material of any kind.
Installing software (including programs, screensavers and fonts) on Tenth-owned devices without approval from the Director of Technology, even if you believe it will be helpful to Tenth.
Downloading or disseminating copyrighted material available (including images) on the internet is a violation of copyright law. Permission to copy the material must be granted by the publisher. For assistance understanding what constitutes permission, contact computer support.
Creating or transmitting material, that is derogatory, defamatory, obscene or offensive, such as slurs, epithets or anything that might be construed as harassment or disparagement based on race, color, national origin, sex, sexual orientation, age, physical or mental disability, medical condition, marital status, or political beliefs.
Soliciting or proselytizing for commercial purposes or outside organizations.
4. Torrenting or peer-to-peer file sharing of any kind without written permission from both the Director of Technology and the Church Administrator.
5. Data Ownership, Privacy & Security
All data in Tenth’s computer and communication systems (including documents, electronic files, email and voicemail messages) are the property of Tenth. Tenth may inspect and monitor such data at any time. No individual should have any expectation of privacy for messages or other data recorded in or transmitted through Tenth’s systems. This includes documents or messages marked “private,” which may be inaccessible to most users but remain available to Tenth. Likewise, the deletion of a document or message may not prevent access to the item or eliminate the item from the system.
Improper use of the information systems or the internet may result in a virus, spyware or other programs infecting an individual computer or our broader infrastructure. Such an event could adversely affect the performance of, or completely crash, our systems. Employees who cause such a problem by their intentional violation of this policy (or their gross neglect in utilizing Tenth’s equipment) may be charged the cost of repairing the affected computer and/or system in addition to being subject to discipline up to and including termination. Likewise, any computer, email and internet violation may result in disciplinary action, up to and including termination of employment.
Security procedures in the form of unique user sign-on identification and passwords have been provided to control access to Tenth’s computer system, networks and communications systems. In addition, security facilities have been provided to restrict access to certain documents and files to safeguard information. The following activities, which present security risks, should be avoided.
Computer and email login passwords should never be shared or written down at any time, for any reason.
Users may not store Tenth materials in unapproved online (“cloud”) storage locations.
Attempts should not be made to bypass or render ineffective security facilities provided by Tenth.
Documents and files of other users shall not be browsed or searched without a legitimate ministry reason for doing so and shall only be executed with the authority of the Church Administrator and by the Director of Technology.
Individual users should not make changes or modifications to hardware configurations of computers or other equipment. Requests for such should be directed to computer support.
Users should not attempt to boot equipment from removable media.
However, some simple measures can also foster higher levels of security. Users are encouraged to:
Fully restart computers regularly (e.g. once per week)
Turn off computers and devices when they will be away from them for extended periods of time.
Computer and email login passwords should never be shared or written down at any time, for any reason. Passwords for secondary systems should be stored in encrypted forms.
You should refrain from posting information about members, visitors, or guests of Tenth, including photographs from Tenth’s events that depict members, visitors or guests, unless you have specific consent to do so by the persons whose information or photograph is disclosed. Be especially careful not to disclose information or photographs of children or anyone else who may not have legal capacity to authorize the use or disclosure of their photograph or other information. Do not do so unless you have the consent of a legal guardian. If in doubt about consent, do not post such a photograph or disclose such information.
6. E-mail and voicemail
Email and voicemail messages reflect Tenth’s image. They should be composed in a professional manner, as if printed on Tenth Church’s letterhead. Employees should be aware that electronic files are subject to discovery and may subsequently be used in litigation involving the church or employee. Therefore, it is expected that employee statements in electronic messages and files will reflect favorably on the church and the employees.
7. Branding, Representation & Social Media Accounts
Any Facebook, Twitter, or Instagram account (or platforms that are comparable) which serves as a ministry page for Tenth is considered the property of Tenth and must comport with the church’s image and mission. Each such page shall be registered with the Director of Technology. Access to these accounts shall also be given to the Director of Technology including current login credentials as applicable. Failure to comply may be cause for disciplinary action.
All social media accounts used for ministry purposes must comply generally with the most recent version of Tenth’s brand standards.
You should never represent yourself as a spokesperson for Tenth unless you have been specifically authorized to do so, including in speaking to the media. If you communicate about Tenth or its activities, you should do so in a way that makes it clear you are expressing your own views. Be mindful that others may easily believe you are speaking for the organization. If that will not be obvious from the content, you should specifically state, “Views are my own and do not necessarily reflect those of Tenth.”
You should not use Tenth’s logo, trademark or other proprietary graphics for any purpose of your own.
As an employee of Tenth, you must also be aware that postings on individual social media accounts are reflective of Tenth. Great care should be taken that individual postings do not detract from the gospel mission and values of Christ and his Church.
Failure to comply with this policy may lead to discipline, up to and including termination of employment, and if appropriate, Tenth will pursue all available legal remedies. Tenth also may report suspected unlawful conduct to appropriate law enforcement authorities. Tenth will not construe or apply this policy in a manner that improperly interferes with employees’ legally protected social media discussions regarding terms and conditions of employment.
Postage and Copying
You may not use the Tenth name, address, or stationery (letterhead) for personal mail, nor should you use Tenth purchased postage. Up to ten copies per month may be made for personal needs.
Travel and Other Expense Reimbursement
See the most recent Expense Guidelines (Policy), and the Mileage Reimbursement Policy and Plan.
