Bunnings Hammer

Conditions of Use



Personal Computers, Laptops, Mobile Devices, E-Mail, Internet - Conditions Of Use

Bunnings Group Limited and Bunnings Limited (either, or collectively, Bunnings or the company) in their respective capacities as an Employer provides its team members with personal computers, laptop computers, mobile devices (smart phones & tablet computers), email and internet services, specifically to enable those team members to carry out the functions required of the position they hold within the company.

The computer equipment and services supplied or authorised are to be utilised under the following conditions:

1. Used for company business. The equipment and/or services are to be used predominantly in the performance of work directly related to the position requirements of the team member and for use in carrying out company business. Limited personal use is acceptable at management's discretion. The storage of non-business data is expressly forbidden, for example but not limited to music, video & software (which when stored on Bunnings' servers may place the company and the team member personally in breach of third party intellectual property rights).

2. Authorised software. Only Technology Services Team Members are authorised to install, upgrade or distribute authorised software to any Bunnings device. In all cases, Conditions of Use and other contractual obligations relating to the software, especially licensing, must be adhered to.

NOTE: All company mobile devices (Apple & Android devices such as iPads, iPhones etc.) require applications to be authorised by the department's National Manager prior to installation.

3. Internet and email monitoring. The company runs software applications throughout the network, which specifically act to detect non-compliant use of the internet and email services. Team members should be aware that the use of internet and email services is constantly monitored. The use of software or other means to bypass network security/monitoring software within the company is expressly forbidden.

4. Internet and email for business only. Access to internet and email services is specifically for business related purposes, however limited personal use is acceptable at management's discretion.

5. Internet and email content. Users of the Internet and of the company's email services are expressly forbidden from transmitting any non-business related material, either within the Bunnings business, its related entities, or to external parties, however limited personal use is permitted, providing it does not infringe the following: (i) Originating or sending on offensive material, including pornography, offensive jokes, abusive material and the like, will not be tolerated. (ii) Use of emails to harass, abuse or defame persons, management or the company is expressly forbidden. (iii) Disclosure of corporate information via e-mail or other electronic means should always be cleared with management prior to distribution.

Receipt of offensive material. Where a team member receives such material, it is to be deleted from the system, and a direct manager or supervisor alerted to its existence. Under no circumstances is the material to be forwarded to any other party.

7. Breaches. All team members are to be aware that non-compliance with these Conditions of Use may result in disciplinary action or dismissal.

8. Password security. All team members must make every effort to ensure that the passwords and applications to which they have access remain secure. Under no circumstances is a team member permitted to share the accounts or passwords allocated to them with any other person, except a member of Bunnings Service Desk team in the context of a technical inquiry.

9. Lost / stolen devices. Lost or stolen devices are to be reported to Bunnings' Service Desk immediately, ensuring appropriate measures can be taken to cancel data services and remove company data (where possible).

10. Personal mobile devices. Where access is approved for a personal mobile device to connect to Bunnings email system, team members must agree to the Terms and Conditions of Use of Personal Mobile Devices, which incorporates security policies covering passwords, encryption & remote wipe.

11. Individual Liability. Team members are to be aware that a breach of the above conditions may render them individually liable under various laws, including anti-discrimination, equal opportunity and harassment laws, as well as termination of their employment.



Information Security - Every Team Member has a part to play

In today's environment, the smooth operation of our business relies heavily on computer systems and the information they make available. Providing appropriate security protection for our systems and data is essential to the maintenance of our business operations, our high standards of customer service and our profitability. Our Information Security Policy is available on our intranet.