Docstoc

Trucking Job Search by Company Policies

Document Sample
Trucking Job Search by Company Policies Powered By Docstoc
					                 Weaver Trucking Staff



                 Kathy Hutchins



Deanna Bangert   Camile Furgala   Sarah Jones
                                                             Table of Contents
Weaver Trucking ................................................................................................................. 1
Table of Contents ................................................................................................................ 2
Introduction ......................................................................................................................... 3
Mission of the organization................................................................................................. 3
      Figure 1 ....................................................................................................................... 3
Purpose of the IT policy manual ......................................................................................... 3
Assets and Hardware ........................................................................................................... 3
Software .............................................................................................................................. 4
      Figure 2 ....................................................................................................................... 4
Customer Data ..................................................................................................................... 4
Internet ................................................................................................................................ 4
      Figure 3 ....................................................................................................................... 5
Instant Messaging................................................................................................................ 5
E- mail .................................................................................................................................. 5
Security................................................................................................................................ 5
   Physical controls ............................................................................................................. 5
      Figure 4 ....................................................................................................................... 6
   Intellectual controls ......................................................................................................... 6
Privacy................................................................................................................................. 6
      Figure 5 ....................................................................................................................... 7
Table of Figures .................................................................................................................. 8
      Figure 1 ....................................................................................................................... 8
      Figure 2 ....................................................................................................................... 8
      Figure 3 ....................................................................................................................... 9
      Figure 4 ....................................................................................................................... 9
      Figure 5 ..................................................................................................................... 10
Appendix
      Acknowledgement of E- mail and Internet Usage Policy                                                                               11
Index .................................................................................................................................. 12
Works Cited....................................................................................................................... 12
Introduction
        Weaver Trucking was started 14 years ago by Edwin Weaver in Smallville; TN. Edwin was
driving for another trucking company when he decided to buy his own tractor trailer. Edwin found his
loads from a local grocery store on bulletin boards at a local truck stop, and he negotiated with the
shipping manager to start hauling for them at a negotiated rate. Edwin was on time and had very little
damage, and the grocery store began offering him more and more loads. Edwin began to get more
business than he could handle on his own, so he decided to invest in more tractor-trailers and hire drivers
to drive the routes. Edwin also hired a full- time office staff to manage his accounts and driver
dispatchers.

Mission of the organization
       To safely provide value-added transportation services that meet or exceed our customers’
expectations in order to move goods in a timely, efficient and safe manner.


Figure 1
The three legged stool is what everyone should be thinking about. Is the company job taking too much
time? Is the company being efficient? Is safety being practiced throughout the company?




Purpose of the IT policy manual
        The purpose of this manual is to provide a complete understanding of what is to be expected when
using the internet systems within Weaver Trucking. Management and employees will fully understand
what parameters their job requires.

Assets and Hardware
       Warehouse and office facility
       30 Trucks
       Networked computers
       Desks
       Company car
       Telephones

Software
       Customer Relation Management software
       Intranet for suppliers and wholesale customers
       GPS Tracking software for our delivery trucks

Figure 2
GPS tracking for each one of our delivery trucks will enable us to provide up to the minute information to
the customer and employees. A signal goes from the truck, to a satellite and back to Weaver Trucking
tracking software.




Customer Data
         We have a database in our CRM software with contacts and business information on each
company we do business with. Locations, typical order amount, reaccurring orders and payment
information is all recorded in the database and allocated to the corresponding department. For example,
the billing department might not necessarily need the directions to the business.

Internet
       The Internet is to be used for 90% work related access and activities. At Weaver Trucking we
understand the importance of culture and how it affects our company. The Internet is an integral part of
the day to day operation, however some personal use is allowed. Since most of our business is conducted
through the Internet, we cannot stress the importance of it being used for business purposes. We do have
an on-site IT staff that will monitor computer usage to ensure compliance. Each employee will be given
password access to the system. Each employee is responsible for the protection of his/her password.
There will be no inappropriate usage involving vulgar or pornographic information. At no time will the
system be used to invite derogatory, malicious and profane attacks against the company, the management
or staff and employees of Weaver Trucking. Passing of company classified information is not permitted
at any time and violators are subject to immediate termination.


Figure 3
By allowing the 10% personal usage, we feel the moral of the company will increase and spark creativity.
Employees know that they have a job to do and while, at no time does this policy allow any emp loyee to
spend the majority of his/her work hours spanning the internet, we want to allow some flexibility.




Instant Messaging
         Instant messaging is not allowed under any circumstances for personal usage. The intranet system
is to be used for work related activity only and the internet IM service will not be loaded on this systems
by the IT personnel and is not allowed to be downloaded by any employee.

E-mail
        While we allow for some personal usage of our internet system, our IT personnel will period ically
and/or at the request of managers review internet usage and email content. Because of security issues, all
email is subject to screening by the IT personnel. While the privacy of our employees remain a priority,
the best interest of the company will be foremost in monitoring email usage.

Security
   Physical controls
       Visitor check in
       Bags over the size of a briefcase are subject to search by our front office
       Building hours are strict. Only a manager with proper access is allowed in the
       building after hours
       Security cards that allow access into building
Figure 4
The front office is designed to allow for a check-point mentality. All visitors and employees will pass
through the same doors. A receptionist will be able to monitor these doors.




   Intellectual controls
       Database integrity checks ensure data entry is not malicious or corrupt
       Password and biometrics access to extremely volatile information


Privacy
        Associates at Weaver Trucking are encouraged to share as much information with t hose who
benefit from it. For example, if a sales associate knows that a customer wants a new service offered, it is
the responsibility of the sales associate to let the service department know.
        Privacy of personal matter is limited. The work environment is meant to remain open and free of
secrets. Personal space searches, with the exception of computer or digital searches will be only after
written notice. Due process will be given to any individual at Weaver Trucking.
Figure 5
The purpose of an open environment is for information sharing. As depicted below, if there is limited
information being shared throughout the company the less information will be available.
Table of Figures
Figure 1
The three legged stool is what everyone should be thinking about. Is the company job taking too much
time? Is the company being efficient? Is safety being practiced throughout the company?




Figure 2
GPS tracking for each one of our delivery trucks will enable us to provide up to the minute informat ion to
the customer and employees. A signal goes from the truck, to a satellite and back to Weaver Trucking
tracking software.
Figure 3
By allowing the 20% for personal use we feel the morale of the company will increase and also spark
creativity. Employees know that they are there to do a job but we want to allow some flexibility.




Figure 4
The front office is designed to allow for a check-point mentality. All visitors and employees will pass
through the same doors. A receptionist will be able to monitor these doors.
Figure 5
The purpose of an open environment is for information sharing. As depicted below, if there is limited
information being shared throughout the company the less information will be available.




All charts by Kathy Huthcins
ACKNOWLEDGMENT OF E-MAIL AND INTERNET ACCESS POLICY


   As an employee of Employer, I understand that the confidentiality and
protection of Employer’s information is of the utmost importance. I have read
and understand Employer’s Policy on acceptable use of E-mail and Internet
access.
   If I receive a password for access to E-mail, the Internet or any other system
of electronically stored computer information, I will use it only for authorized
purposes. I agree not to use a code, access a file or retrieve any stored
communication other than where explicitly authorized unless there has been
prior clearance by an authorized representative of Employer.
   I will notify Information Systems immediately if I believe that another
person may have unauthorized access to my password.
   I understand that all information stored in, transmitted or received through
Employer’s systems of printed or computer information is the property of
Employer, and is to be used primarily for job-related purposes.
   I further understand that authorized representatives of Employer may
monitor the use of Employer’s systems of printed or computer information
from time to time to ensure that such use is consistent with Employer’s policies
and interests.
   Further, I am aware that use of an Employer provided password or code
does not in any way restrict Employer’s right or ability to access electronic
communications.
   I am aware that any violation of Employer’s E-mail or Internet Access
Policy may subject me to disciplinary action, up to and including discharge
from employment.


(Name) __________________________________

(Signature) ____________________________________

(Date) ________________________________
Index
Briefcase size
Creativity
        Flexibility
Customer information
Efficiency
GPS (Global Positioning System)
History
Moral
Organization
Personal use
        Email
        Instant Messaging
Purpose
Searches
Store hours


Works Cited

Weaver Trucking. Company information handout. Retrieved April 24, 2005, from
http://courses.kennesaw.edu/SCRIPT/it3700_03sp05/scripts/student/serve_home?1658840568+START#

				
DOCUMENT INFO
Description: Trucking Job Search by Company Policies document sample