This section describes best practices and general guidance for secure device management, data access, and data sharing while working remotely. Harvest is a recommended tool for tracking where and how working time has passed. Employers should talk to their employees and all representatives about who will cover any additional costs employees may have when working from home. Stay reachable while teleworking; Employers and employees need to be practical, flexible and sensitive to the other`s situation when working from home due to the coronavirus (COVID-19) pandemic. Compensation is determined according to the role of the job. Health insurance, power take-off and other individual or group benefits are not changed by a remote work agreement. Remote employees also receive [$100] per month as a remote work allowance to pay for office-related costs (p.B. Electricity and Rent). Occasionally, we may pay for our remote employees to visit our offices.
Do not use random flash drives. Never use a USB flash drive if you don`t know where it came from, and don`t use one if you`ve connected it to a system that you can`t personally guarantee for security. This happens more often than you think and carries the risk of exposing your system to malware. Employees who work from home continue to be covered by the Working Time Act. Ultimately, the work completed and the results are expected, whether in the office, on-site at the client`s home or at the WFH. 4. The Parties acknowledge that this Agreement may be evaluated on an ongoing basis to ensure that the quality of work, efficiency and productivity of the employee are not affected by the telework agreement described herein. Telecommuting is a privilege, not a company-wide right or benefit; The Company reserves the right to terminate the Agreement and revoke this privilege in its sole discretion. Unsecured access to data, a lost or stolen device, and/or other breaches can compromise data or even allow an unauthorized party to access your company`s entire network. Therefore, all employees (including contractors and vendors with access to enterprise systems) are responsible for taking appropriate measures, as described below, to secure their connections, devices, and data.