Posts tagged "For"

Key Skills for HR Practitioners in the Future

The key skills required for the HR practitioner

 

Introduction

Before considering what the key skills for HR practitioners in the future will be, it is essential to identify the future challenges for the HR service.

The role of HR is changing as a result of many influences. These include: globalization resulting in increased competition; a change from a large manufacturing base in the UK to service-related industries such as finance; demographic trends evidenced by falling birth rates and extended life expectancy. These trends affect the labor market and have resulted in skill shortages in specific areas. The HR practitioner needs to understand the impact of these factors on their organization.

In considering key skills, much will depend on the functionality of HR in the particular organization.  The function may deliver a mainly transactional service or may have moved towards the strategic business partner role, but certain factors will remain the same regardless of model of delivery. In many organizations the administrative function of HR has already been outsourced, for example payroll and pension administration.
There can be confusion about the role of HR as it moves from one model to another, and HR practitioners can find that they are still heavily involved in the operational role, handling grievances and discipline while new demands are made of them. The expectations of the service and individuals need to be clearly articulated and managers need to be clear about their role in managing people.
The challenges for the future include:

1. Added value
HR needs to be able to demonstrate clearly how it impacts on the business. However, measuring the effectiveness of HR is not easy. Much research has been conducted on whether there is a link between good HR management practice and increased productivity.  In a study by the Centre for Economic Performance, London School of Economics and the Institute of Work Psychology. one of the questions was: “Do HRM practices predict change in company performance?” The results of this survey found a 19% change in profitability and an 18% change in productivity. The report states: “This is a clear demonstration of the link between the management of people and the performance of companies.”
However, increased monitoring and collection of data can be administratively cumbersome and tie up a lot of time for HR practitioners.  This needs to be carefully implemented or it does not add value but becomes simply another administrative burden.

2. Recruitment and retention
In view of the global and sector changes outlined above, there is a tightening labour market in certain areas. It is important that HR understands the labour market it is recruiting from and also the need to retain key talent in the organisation.

3. Succession planning
There needs to be a clear workforce development plan, identifying areas which could be affected by turnover or changes to the business. By planning in advance, the organisation is not left trying to cover gaps in key areas. This can also inform the organisation in terms of identifying future managers and leaders. Career routes can be identified and linked to an individual’s career aspirations. This development plan will also inform the learning and development function of HR.

4. Motivation/engagement
If HR is to make an impact and demonstrate that people make a difference, there is a challenge with employee motivation and engagement. There is evidence to suggest that motivation and engagement are linked to certain factors. Some of these are listed below.

5. Employer of Choice
To engage the best talent and keep these people motivated and engaged, many organisations now invest in their image as an employer of choice.  The Sunday Times undertakes a year survey of the 100 Best Companies to work for in conjunction with the Department of Trade and Industry and Investors in People.
In the 2005 survey it states: “This research clearly demonstrates that a person’s experience of their workplace is a result of their feelings and perceptions in the following areas: leadership (the leadership and senior management of the company): my manager (the local management on a day-to-day basis); personal growth (opportunities to learn, grow and be challenged); wellbeing (balancing work-life issues); my team (immediate colleagues); giving something back (giving back to society and to the local community); my company (the company and the way it treats staff); and fair deal (pay and benefits).”

 

Key Skills
In view of the areas identified above the key skills for HR practitioners for the future are:

1. Communication
Clear, concise communication – both verbal and written – is essential. Without these skills, the practitioners cannot engage productively with individuals, nor with the top table.

2. Business understanding and influencing skills
I have linked these two skills together as in my opinion the HR practitioner needs to be able to influence the organisation by using examples and information from other organisations in the sector of activity they support.  This requires not only a sound understanding of their own organisation but also wider knowledge of how other organisations have approached similar problems.

3. Data literacy/analytical skills
The HR practitioner of the future needs to be data literate and be able to question the figures and reports which they read.  The data needs to be interpreted and an understanding of the wider picture is necessary to identify underlying factors which may be influencing what they read.  For example, during a time of change there may be an increased level of sickness absence, in considering employee turnover are there peak periods or is it steady throughout the time period?

4. Coaching and inter-personal skills
HR has a role in enabling managers to be confident in people management, and this should be supported by individual coaching. Inter-personal skills feature in most of the work of an HR practitioner but these skills are paramount in giving feedback to the people being coached.
There is also a need for HR professionals to be able to access coaching for themselves to identify their own development needs.

Be the first to comment - What do you think?
Posted by Hrformats - August 20, 2012 at 5:11 AM

Categories: HR   Tags: , , , , , ,

Checklist of induction for new employee

Kindly find the attached copy of format for checklist of INDUCTION/ORIENTATION for new employee

CHECK LIST FOR NEW JOINEES
 
NAME :…………………………… DESIGNATION :………………………………………
DEPARTMENT :……………..……….. DATE OF JOINING :………………………………
PRE-JOINING( MOST URGENT REQUIRED FROM THE EMPLOYEES)
SL.
No.
PARTICULARS To be filled by New Employee
(Please mention what document Submitted)
To be filled in by HR Department
(Please mention what document Received)
1 C. V.
2 EMPLOYMENT APPLICATION FORM:
3 DUPLICATE COPY OF OFFER LETTER DULY SIGNED BY PROSPECTIVE EMPLOYEE
4 Five (5) PASSPORT SIZE COLOR PHOTOGRAPHS & 01 FAMILY PHOTOGRAPH:
5 TWO (2) REFERENCE NAMES, DESIGNATION & CONTACT NO. FROM CURRENT EMPLOYER:
6 PHOTOCOPIES: (All)
Degree Certificate & Marksheet
– SSC / HSC board mark sheet
  (Please also specify what document
has been submitted)
7 IDENTITY PROOF: (Any one of the following)
– Valid Passport Photocopy
– Driving License Photocopy
– Voter ID card photocopy
(Election ID card)
– Pan card Photocopy
– Corporate Photo ID card
8 RESIDENTIAL ADDRESS PROOF:(Any one of the following)
– Telephone Bill
– Electricity Bill
– Valid Passport Photocopy
– Ration card
– Latest LIC premium receipt
9 LAST THREE (03) MONTHS SALARY SLIP FROM CURRENT EMPLOYER
(Please also specify- what document has been submitted)
10 COPY OF RELIEVING & EXPERIENCE LETTER FROM CURRENT EMPLOYER
11 LAST 03 MONTHS  BANK STATEMENT OF YOUR SALARY A/C OF YOUR CURRENT EMPLOYER
PERSON RESPONSIBLE FOR FILLING UP & VERIFYING THE ABOVE
(EMPLOYEE)
NAME:…………………….………                                                                                                                                                                                                                                       SIGNATURE:…………………………                                                                                                                                                                  DATE OF DOCUMENTS SUBMITTED: ……………………              LOCATION……………………………………………………………
(HR Department)
NAME:…………………                                                                                                                                                                                                                             SIGNATURE:…………………………                                                                                                                                                                    DATE OF DOCUMENTS RECEIVED: ……………………….
LOCATION……………………………………………………………
ORIENTATION CHECK LIST FROM HR DEPARTMENT
NAME :…………………………………………………………… DESIGNATION :…………………………………………………………………
DEPARTMENT :…………………………………………….. DATE OF JOINING :………………………………………………………………………
SL.
No.
PARTICULARS SPECIFICATIONS
1 OFFICE NOTE TO:
             – Security gate
             – Director
             – CEO
             – HR
             – Finance
2 REPORTING TO:
(Please specify the name & designation of the person)
3 INTRODUCTION TO MANAGEMENT / TEAM MEMBERS (Also send Welcome Note):
4 REFERENCE CHECK:
5 ENTRY IN THE REFERENCE REGISTER:
(if applicable)
6 I – CARD / SMART CARD ISSUED ON:
7 I – CARD / SMART CARD NO:
8 NAME ENTERED ON:
i) ATTENDANCE RECORD:
(Please specify the date of entering name in the attendance record)
ii) SALARY PROGRAMME:
(Please specify the date of entering name in the salary programme)
9 SALARY ACCOUNT :
(Account Details)
Name of Bank/Branch
– Saving Bank A/c No.
– A/c Holder Name  
14 Assets to be Provided:
Office Stationary
           – Any Other
(Please specify)
15 VISITING CARD:
(HR Department)
NAME:…………………………………………………………………                                                                                                                                                                                                                                       SIGNATURE:…………………………                                                                                                                                                                    DATE:…………………LOCATION……………………………………………………………
(CEO)
NAME:…………………………………………………………………                                                                                                                                                                                                                             SIGNATURE:…………………………                                                                                                                                                                    DATE:…………………LOCATION……………………………………………………………
ORIENTATION CHECK LIST FROM IT /  SYSTEM ADMIN DEPARTMENT
SL.
No.
PARTICULARS To be filled by New Employee To be filled by IT /  SYSTEM ADMIN DEPARTMENT
1 SYSTEM ALLOTTED:
3 TERMINAL:
Shared
– Individual
4 Username & Password Activation of Time management  / payroll
5 SERVICES ALLOWED:
(To be specified by IT head)
6 EMAIL CONFIGURED:
(Permission for external / internal
mail id to be given by IT head )
( Please mention the email id)
7 LOGIN CREATED:
             – Login Id @relyservices.om
             – Group
DIRECTOR – nkhot@
CEO – bpal @
HR –  hr@ & hemant@
FINANCE – finance@
PRODUCTION – bsachin@
SALES – Sales@
TRAINING  – bttrainer@
             -Space Allotted (MB)
8 PRINT ACCESS:
9 PRINT QUOTA:
10 INTERNET ACCESS TYPE:
  -A
-B
-Mail
-Super
10 SYSTEM / WORKSTATION ALLOTTED:
(Please specify the location)
11 SYSTEM / WORKSTATION ALLOTTED:
(Please specify the location)
PERSON RESPONSIBLE FOR AUTHORIZATION UP THE ABOVE
(EMPLOYEE)
NAME:…………………………………………………………………                                                                                                                                                                                                                                       SIGNATURE:…………………………                                                                                                                                                                    DATE:…………………LOCATION……………………………………………………………
(IT / System Admin Department)
NAME:…………………………………………………………………                                                                                                                                                                                                                             SIGNATURE:…………………………                                                                                                                                                                    DATE:…………………LOCATION……………………………………………………………

 

Click Here To Download Check List For New Join

Be the first to comment - What do you think?
Posted by Hrformats - August 20, 2012 at 5:06 AM

Categories: HR   Tags: , , , ,

Draft of Communication Policy For Corporates

I have attached draft of communication policy for corporates.

 

Draft outline of Communication policy

 

Part I: INTRODUCTION

Part II: DEFINITIONS
Part III: CONDITIONS OF USE
Part IV: PROCEDURES
Part V: SECURITY
Part VI: RESPONSIBILITY
Part VII: ENFORCEMENT
Part VIII: APPLICATION OF THE POLICY
Part IX: EFFECTIVE DATE


ANNEX I – E-MAIL ETIQUETTE

 

 

XXXXXX (WRITE YOUR ORG NAME) CORPORATE E-MAIL
A Directive on E-mail Use

 

Part I: INTRODUCTION
1. Electronic mail is an essential element of business in XXXXXX (WRITE YOUR ORG NAME), providing convenient, time-saving communication within the  organization and externally. It also conserves institutional memory. The electronic exchange of information has a profound impact on business, and regulating such exchange is not merely a technical issue. Clear guidelines are required in order to ensure that  the e-mail system is used efficiently and effectively.

2. The “XXXXXX (WRITE YOUR ORG NAME)’s corporate e-mail” directive is issued by ____ in the framework of its mandate for administration management and in collaboration with other concerned Offices. It sets forth the policy for an efficient, secure and reliable use of the corporate e-mail system.

3. The objectives of the policy are to ensure that:
XXXXXX (WRITE YOUR ORG NAME)’s e-mail system is used efficiently and effectively;
staff members are informed of the rules regarding use of e-mail services;
availability and continuity of e-mail services are maximized; •
the institutional memory of e-mail communication is preserved; •
exposure of the Program to breaches in security is minimized; and •
the use of e-mail is compatible with the ethical standards that our corporate follows

The rules and procedures described in this document apply to all XXXXXX (WRITE YOUR ORG NAME) staff members and
anyone granted access to XXXXXX (WRITE YOUR ORG NAME)’s e-mail system (hereafter called “users”).

Part II: DEFINITIONS
As with most businesses, e-mail communications at XXXXXX (WRITE YOUR ORG NAME) fall into one of two categories:
Administrative or Personal.


Administrative e-mail
4. Administrative e-mails convey content related to XXXXXX (WRITE YOUR ORG NAME) activities or to the service conditions of its staff. They enable and facilitate operations, provide a basis for individual or institutional accountability, and/or protect legal interests.
5. Administrative e-mail messages are part of the institutional memory and, as such, are preserved in electronic registries. Such messages include, but are not limited to: project documents, donor proposals, contracts, press releases and letters to applicants.

Administration Department Directive 3
6. E-mail messages of a less substantive nature which have an indirect, supportive
relationship to XXXXXX (WRITE YOUR ORG NAME)’s business may not need to be registered in electronic registries. Such messages are expected to have a short-term value and include drafts of documents, providing or requesting meeting or travel arrangements, responding to simple enquiries.

Personal e-mail
7. Personal e-mails have no relationship whatsoever to XXXXXX (WRITE YOUR ORG NAME) or to the service conditions of its staff. Examples of personal e-mail include: correspondence with friends or family, responses to advertisements, purchase of personal goods.
8. XXXXXX (WRITE YOUR ORG NAME) values the importance of enabling its staff to properly balance work and their personal lives. XXXXXX (WRITE YOUR ORG NAME) recognizes that staff can use the corporate system to exchange personal e-mail from time to time, particularly in hardship conditions. In other circumstances, staff is encouraged to use commercial e-mail accounts for personal purposes. These accounts are widely available at no cost.

Part III: CONDITIONS OF USE
XXXXXX (WRITE YOUR ORG NAME) property
9. Corporate e-mail services are extended for the use of XXXXXX (WRITE YOUR ORG NAME) staff and partners to accomplish tasks related to and consistent with XXXXXX (WRITE YOUR ORG NAME)’s activities and mission.
10. With the exception of material clearly owned by third parties, XXXXXX (WRITE YOUR ORG NAME) is the legal owner of all accounts and information stored on or passing through its e-mail system.
11. E-mail messages generated by users are identified, over the public Internet, under the domain @XXXXXX (WRITE YOUR ORG Website).
12. Access to XXXXXX (WRITE YOUR ORG NAME) e-mail services is a privilege that may be restricted by XXXXXX (WRITE YOUR ORG NAME) without prior notice and the consent of the e-mail user.

Activation and termination of e-mail accounts
13. A user is provided with an e-mail account by the EDP department through the
completion of an access form signed by his or her manager.
14. When a user leaves the company e-mail system privileges cease, XXXXXX (Write your Org Name) unless a request for continuation has been approved in writing by the EDP head. Normally, such approvals will be granted for a limited period.
15. In special cases, e-mails could be redirected to the user’s new affiliation or to a designated account at XXXXXX (WRITE YOUR ORG NAME) for a reasonable period of time, as determined by the staff managers.
16. E-mail accounts that have not had any activity or access for a period of six months will be automatically deleted and the corresponding contents archived.

Administration Department Directive 4

Part IV: PROCEDURES
17. XXXXXX (WRITE YOUR ORG NAME) recognizes e-mail as an indispensable means of communication and emphasizes proper e-mail content and prompt replies in delivering quality service and a professional image. Common rules are set hereafter to communicate better and derive maximum benefit from using e-mail efficiently. A list of encouraging practices can be found in Annex I, ‘’email
etiquette‘’.
18. To supplement this Policy, field offices may define additional technical conditions of appropriate use for local computing. Such conditions are intended to deal primarily with situations of limited resource supply.

When to use e-mail
19. The use of e-mail is encouraged particularly when it is a cost-effective means of communication, when it facilitates work in multi-time zone environments, or when the message/information being sent needs to be transformed for other uses.
20. At the same time, e-mail is designed for convenience, not urgency. The phone is a better tool for urgent messages. When actually important, a follow-up e-mail should be sent to document the verbal discussion.
21. XXXXXX (WRITE YOUR ORG NAME) staff and other users are requested to use the same personal and professional courtesies and considerations in e-mail as they would in other forms of communication, particularly those applicable to written communications. It should be kept in mind that e-mail creates a tangible record of communication.

User identification
22. In line with XXXXXX (WRITE YOUR ORG NAME)’s culture of transparent communication, the user name, e-mail address, organizational affiliation and related contact information must always reflect the  actual originator of a message.
23. Anonymous accounts are not allowed.
24. The e-mail sender is automatically identified by the first and last names of the owner (e.g. eugene.smith@XXXXXX (Write your Org Name).org or Eugene Smith/XXXXXX (WRITE YOUR ORG NAME)).
25. Further identification of the sender should be made by inserting the following
information XXXXXX (Write your Org Name) under the body of the e-mail message: first name, last name, title and Office, telephone number(s).

Administration Department Directive 5
Choice of recipient and subject
26. The “To” header line. Recipients listed in the “To” header line should be limited to those for whom the message requires direct attention or action. If a message is addressed to multiple parties, no one person is considered the responsible party.
27. The “CC” header line. Recipients listed in the “CC” header line should be limited to those who need the message for information purposes but are not required to take action.
Senders should make a careful selection of recipients to avoid an XXXXXX (Write your Org Name)necessary accumulation of e-mails by recipients, thus detracting from important information that recipients may need to access.
28. The “BCC” header line. Blind copies are permitted only when a message needs to be sent to a large number of recipients. Each recipient listed in the BCC header line will receive a copy of the e-mail with his or her name in the To header line. This is considered proper protocol by corporate standards.
29. Various lists of multi-recipient addresses are available for this service: All HQ Staff’, ‘All Country Directors’, ‘All XXXXXX (WRITE YOUR ORG NAME) Staff’. Its use is limited to offices of Division Directors and the central ___service desk.
30. The “Subject” header line. As all e-mails are filed in an Organization-wide system, e-mails should contain only one topic in the subject line to facilitate this process. The topic should be expressed as tersely as possible. On those occasions when the recipient needs to be provided with information on two or more XXXXXX (Write your Org Name)related topics, it is advisable to send separate emails, with each corresponding to one topic.

Replying to an e-mail message
31. Individuals should respond promptly to all messages containing their names in the
“To:” header field. An acknowledgement of receipt is expected be sent within 24 hours, and a substantive reply within three working days whenever possible, unless the message makes it clear that no response is necessary.
32. All users accepting the responsibility of a mailbox in their name should check the mailbox at least once each day when they are in the office. They should also make arrangements for the handling of their e-mail during absences, either by having their e-mail forwarded to another XXXXXX (WRITE YOUR ORG NAME) staff member or activating an out-of-office reply.
33. To keep the thread and context of the message clear, it is recommended that the “reply with history” function be used when replying. However, any  attachment should be removed before using the function.
34. To maintain e-mail effectiveness, the function ‘’ reply to all’’ should be carefully used: only the interested recipients should be addressed. It is not necessary to “copy all” to get the point across. This function may clog up the recipient’s mailbox, creating impediment and nuisance.

Administration Department Directive 6
35. If an e-mail message contains restricted information1, users must not forward it to another recipient unless the recipient has been authorized to view the information or the originator has explicitly approved the forwarding.
Copying communications in the electronic registry.
36. In order to maintain the integrity of the Programs institutional memory, all
administrative electronic correspondence that has financial, fiscal, administrative or legal value should be copied to the electronic registry.
37. Administrative e-mail messages of a less substantive nature, (e.g. meeting or travel arrangements, simple enquiries) should not be registered in the electronic registry. It may be saved in the user’s personal computers for quick reference and then discarded whenever suitable.

Deleting messages/attachments
38. Mailboxes are not intended to be used as data repositories; users should save
important e-mail messages and attachments as documents in their personal computers or in the electronic registry.
39. Old or unneeded messages should be deleted or archived as they take up valuable disk space. Attachments should be deleted after replying. Unless there are new recipients being addressed, attachments needlessly consume system resources.
40. Attachments should be zipped before being sent. A number of field offices suffer from poor connectivity. Large attachments may clog the line up and cause much inconvenience.

Personal use
41. XXXXXX (WRITE YOUR ORG NAME) recognizes the need to use its systems for personal use, which may arise from time to time. In these instances, staff can make personal use of corporate e-mail facilities, provided that it does not:
a. interfere with the operation of XXXXXX (WRITE YOUR ORG NAME)’s computing facilities by wasting computer resources or unfairly monopolizing them to the exclusion of others. Computer based resources – such as network bandwidth and storage capacity – are not unlimited;
b. diminish the user’s productivity in terms of work-related obligations; and
c. violate the rules contained in this or any other applicable policy.

Prohibited use
42. All actions and communications performed by users in the course of serving XXXXXX (WRITE YOUR ORG NAME) may reflect the corporate posture or image of the Program. To minimize the risks of
1 For an explanation of restricted information, please refer to Policy AD 2002/002, ‘’XXXXXX (WRITE YOUR ORG NAME)’s Corporate
Information Security Policy’’.

Administration Department Directive 7
compromising this posture or image, the use of XXXXXX (WRITE YOUR ORG NAME)’s e-mail system is not allowed  under the circumstances and conditions described below.
43. Incompatibility with International Civil Service Environment. XXXXXX (WRITE YOUR ORG NAME)’s e-mail services shall not be used to view, store or disseminate any message whose content can be classified as not compatible with a civil service environment. These include, but are not limited to

pornographic texts or images •
material promoting sexual exploitation or discrimination, racism or violence •
messages that are derogatory or inflammatory regarding race, age, disability, •
religion, national origin or sexual preference
information concerning drugs or weapons •
commercial advertisements •
44. Strain on computing facilities or e-mail systems of others. XXXXXX (WRITE YOUR ORG NAME) e-mail services shall not be used for purposes that could reasonably be expected to cause strain on any computing facilities, or interference with others’ use of e-mail or e-mail systems. Such uses
include, but are not limited to:
entry into, examination, use or transfer of, or forging or tampering with the •
accounts and files of others;
misrepresenting, obscuring, suppressing their own or another user’s identity; •
altering e-mail system software or hardware configurations; •
theft, destruction, falsification or unauthorized removal of e-mail messages; •
entering destructive codes (e.g. viruses) and material concerning ‘hacking’; •
exploiting users’ lists or similar systems for the widespread distribution of •
unsolicited mail;
subscribing to newsletters with no business-related content •
sending/receiving attachment files that exceed the size limited set by EDP (filters that are set to prevent large attachments and specific types of files that are harmful).

Part V: SECURITY
2 See directive AD 2003/001 for a complete listing of such prohibitions
Administration Department Directive 8
45. To safeguard data security and help prevent unauthorized access, XXXXXX (WRITE YOUR ORG NAME) puts in place appropriate physical, electronic, and managerial procedures

Confidentiality
46. The XXXXXX (WRITE YOUR ORG NAME) e-mail system technologies and configuration guarantee a high degree of confidentiality. However, confidentiality may be compromised by unintended redistribution of security credentials (e.g. passwords, signatures) or by messages, especially if transmitted over the public Internet.
47. Messages sent/received to/from e-mail accounts outside of the XXXXXX (WRITE YOUR ORG NAME) e-mail system over the public Internet are not protected by XXXXXX (WRITE YOUR ORG NAME) security tools. These messages can be easily read, changed and forwarded without any permission.
48. Users need to be aware that the identity of a sender of messages received from the public Internet may be easily counterfeited. Therefore, due diligence is requested when receiving from external accounts.
49. To limit the dissemination of restricted information, forwarding of e-mail to addresses outside XXXXXX (WRITE YOUR ORG NAME) is not permitted without a copy being saved in XXXXXX (WRITE YOUR ORG NAME)’s system.

Signed authorizations
50. Authorizations of action may be carried out using e-mail, in virtually the same way as practiced using traditional other communications methods (e.g. telephone, letters). This applies only to accounts belonging to XXXXXX (WRITE YOUR ORG NAME) e-mail system.
51. All contracts formed through e-mail offer and acceptance messages, as well as other legal and financial documents, must be formalized and confirmed via paper documents within two weeks.
52. Scanned versions of hand-rendered signatures are not encouraged and do not replace the original sender authorization.

Transmitting sensitive information
53. Users must not send any sensitive information or parameters (such as fixed passwords or account numbers) through e-mail unless the message has been protected by encryption.
54. Encryption refers to the process of making a message indecipherable to protect it from XXXXXX (Write your Org Name)authorized viewing or use. The encryption function works within the XXXXXX (WRITE YOUR ORG NAME) e-mail system but does not necessarily apply to messages in which the recipient is an external account on the public Internet.
55. When sending restricted information, the use of the Return Receipt function is recommended.

Administration Department Directive 9
Unsolicited e-mail
56. If a user has been requested by another user via e-mail or in writing to refrain from sending e-mail messages, the recipient may not send that user any further e-mail messages.
57. In general, XXXXXX (WRITE YOUR ORG NAME) cannot and does not wish to be the arbiter of the contents of e-mails.
Neither can XXXXXX (WRITE YOUR ORG NAME) protect users from receiving unsolicited e-mail they may find undesirable.
However, when technically feasible, XXXXXX (WRITE YOUR ORG NAME) may evaluate and set cost-effective mechanisms to alleviate this problem.

Disclaimer
58. Users shall not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of XXXXXX (WRITE YOUR ORG NAME) or any of its units unless expressly authorized to do so.
59. They should ensure that their messages do not harm the Programs reputation in any way.
60. In line with the policies and procedures of major organizations and companies, all email messages being communicated from XXXXXX (WRITE YOUR ORG NAME) offices to external parties will be attached with a disclaimer notice3

Privacy and system monitoring
61. The Organization recognizes the importance of protecting the privacy of information.
XXXXXX (WRITE YOUR ORG NAME) is committed to make its best efforts to respect the privacy of staff and partners. It is XXXXXX (WRITE YOUR ORG NAME)’s corporate intent to balance its legitimate business interests with reasonable
expectations of privacy.
62. XXXXXX (WRITE YOUR ORG NAME) reserves the right to inspect, monitor and log any aspects of staff activity on its e-mail system.
63. Inspection, monitoring and logging are authorized following the rules set in AD
Directive 2003/001’’ Usage of Internet and network services’’.
64. XXXXXX (WRITE YOUR ORG NAME) reserves the right to retrieve data when there are time-dependent, critical operational needs of XXXXXX (WRITE YOUR ORG NAME) business in which a XXXXXX (WRITE YOUR ORG NAME) Office has determined that the information sought is not more readily available by other means (in such instances, the Managers will authorize retrieval and e-mail users will be informed, when possible).
65. Automatic mechanisms may be set up to check the content of e-mail in order to block those deemed unsolicited (spam).
66. XXXXXX (WRITE YOUR ORG NAME) may elect to publish e-mail addresses as directory information. Requests for identification or release of staff e-mail addresses should be authorized by the Office of the Director, ADH
3 See ICT memoranda 2003 for more details and the text of the disclaimer
Administration Department Directive 10

Part VI: RESPONSIBILITY
Divisional responsibility
67. The Director, AD is responsible for ensuring:
overall implementation of the policy •
monitoring the execution and impact of the policy on the Program •
reporting to the Executive Director on its implementation •
compliance with relevant rules and legislation •
68. The Director, ADI is responsible for ensuring:
implementation of the policy through cost-effective technical solutions •
security of communications and protection of data •
maintenance of technical components •
provision of the required connectivity •
69. Managers are responsible for:
the activities of staff, consultants and project personnel authorized to gain access •
to the e-mail services under their written approval
ensuring staff are informed of the rules outlined in this document and adequately •
trained in the use of the e-mail systems.
Individual responsibility
70. The assigning of an e-mail account is an implicit statement of trust in the individual’s judgment and professionalism. It implies an expectation that he/she will accept the responsibilities inherent with the use.

Specifically, all users are responsible for :
using E-mail in accordance with the rules and procedures set out in this •
document;
taking the necessary precautions to protect the confidentiality of data containing •
personal or confidential information generated in the performance of their duties

For the messages that are sent out from their mailbox and for the security and use of •
their password. Passwords should not be divulged to other persons for any reason.
4 Directive AD 2002/002, ‘’XXXXXX (WRITE YOUR ORG NAME)’s Corporate Information Security Policy’’

Administration Department Directive 11
Copying to the registry any e-mail messages necessary for the completeness of the •
Programme’s institutional memory.

Part VII: ENFORCEMENT
71. Violations of XXXXXX (WRITE YOUR ORG NAME) policies governing the use of the e-mail services may result in disciplinary action, as applicable under staff regulations and rules.
72. Violations of this directive will be brought to the attention of the manager of the relevant office and the Assistant Executive Director AD.
73. The Director, ADI reserves the right to terminate access to computing services in cases of technical misuse.

Part VIII: APPLICATION OF THE POLICY
74. The policy applies throughout the Program, both at Headquarters and in all offices.
75. The directive replaces the administrative Document ADM 95/02 ‘’ Electronic Mail:
Policy and Practice’’.
76. Any questions or comments about this e-mail policy should be referred to the Office of CIO & Director, ADI

Part IX: EFFECTIVE DATE
77. This policy takes effect immediately.

Mr/ Ms.______________

 Executive Director, AD

ANNEX I

Administration Department Directive 12
E-MAIL ETIQUETTE
Here are some suggestions that will enable to better and derive maximum
benefit from this speedy and efficient communications medium.

  • Keep e-mail messages brief. Messages should be concise and to the point.
  • Messages that run into multiple screens are ineffective; people just don’t read them.
  • Keep to short paragraphs with blank lines in between. Reading from a screen is different to reading from paper – it’s more difficult. Great blocks of text are visually demanding  and difficult to read.
  • Keep your formatting simple. Effort spent on making letters bold, italic, colored or  underlined will be lost. Special fonts in messages (rues, faces, dingbats, etc.) will be translated into normal text when received by a system outside.
  • Keep a neutral tone. It is difficult to determine the context and intent of a typed message because you can’t see the person saying what you are reading, and they can’t see you. So, an intended “light” comment can be perceived negatively.
  • Use upper-case words sparingly. As it’s more difficult to read text in capitals, they should only be used for emphasis. Many readers consider the use of capital letters to be the electronic equivalent of SHOUTING.
  • Keep e-mails to one topic. Even if it means sending multiple e-mails to the same person. It’s easier for the recipient to file and forward the mail appropriately.
  • Follow reply threads. If you’re replying to an e-mail and don’t need a new title, then use the “reply” facility. The recipient can immediately grasp and recognize the context.
  • Follow the chain of command. Use proper procedures for corresponding with management. For example, don’t send an e-mail directly “to the top” just because you can. It is not necessary to “copy in” layers of management to get your point across.
  • Use “return receipt requested”. If it’s an important e-mail, use the “return receipt requested” function when sending the e-mail. That stops you from worrying whether it has been received. If you receive an important mail, have the courtesy to send an immediate reply saying it arrived.
  • Check recipients. Before hitting the SEND button, make sure the e-mail is going to only the person/people you want it to go to: especially when replying. It’s easy to reply to all the addressees of an incoming mail when you didn’t mean to, or mistake the name of the sender.
  • Re-read your e-mail before sending it. Time spent getting spelling, formatting and grammar correct is time that creates a positive perception of you amongst people who may only know you through your e-mails.

Click Here to Download Draft Outline of Communication Policy For Corporates

1 comment - What do you think?
Posted by Hrformats - August 16, 2012 at 4:34 AM

Categories: HR   Tags: , , , , , ,

Guideline For PF Withdrawal

1. PF Withdrawal upon resignation :

Upon resignation an employee can either withdraw or transfer his/her PF amounts at his desire.

a) For Withdrawal: In order to withdraw the PF/ Pension funds you have to submit form 19 and 10 C preferably through your employer. Depending upon the attitude and working capabilities of employees in the respective EPF Office, it will take 45 to 60 days to get your balance credited to your bank account. Withdrawals of PF can be done only after 60 days period after resignation.

Form No 19 is for Provident fund withdrawal & Form No. 10 C is for Pension scheme withdrawal. I have attached both the forms for your reference.

b) For Transfer : For transfer you have to get form 13 submitted through your present Company but you need to know your earlier PF a/c no.etc.
Also you need to provide following details to your current company.
• Name and address of the previous company from which PF is still pending to be claimed.
• Group Code

• Date of Joining and date of leaving from previous company.
• Your PF no from the previous company.

2. PF withdrawal during Working period :

The Provident Fund members can avail advances / partial withdrawals subject to certain conditions like Marriage for self and dependent sisters, brothers etc / purchasing of dwelling house or repayment of housing loan / specified medical treatments / Closure of establishment etc.,

You need to submit FORM 31 for claiming amount. But the PF authorities will sanction only if you satisfy the qualifying conditions. I have attached a document ” Guidelines for PF withdrawal” that gives you an clear idea like on what grounds can a employee withdraw PF during his/her working period.

Download 10c form pension fund

Download 13 revised

Download 19 form withdrawal pf

Click Here To Download Guide Lines for PF Withdrawal

1 comment - What do you think?
Posted by Hrformats - August 9, 2012 at 10:31 AM

Categories: HR   Tags: , , , ,

Salary Slabs for IT Professionals

 I have Attached Salary Slabs for IT Professionals

Median Salary by Job – City: Bangalore (India)

Print
Email
Embed

 

Currency: INR  |  Updated: 5/19/2007  |  Individuals reporting: 6,379

 

Median Salary by Years Experience – City: Bangalore (India)

Print
Email
Embed

 

Currency: INR  |  Updated: 5/19/2007  |  Individuals reporting: 6,378

 

Median Salary by Employer Type – City: Bangalore (India)

Print
Email
Embed

 

Currency: INR  |  Updated: 5/19/2007  |  Individuals reporting: 6,373

 

 

Median Salary by Employer Name – City: Bangalore (India)

Print
Email
Embed

 

Currency: INR  |  Updated: 5/28/2007  |  Individuals reporting: 3,744

 

 

 

Click Here To Download Salary Slabs for IT Professionals

Be the first to comment - What do you think?
Posted by Hrformats - August 3, 2012 at 9:10 AM

Categories: HR   Tags: , , , ,

Recovery Letter to Exit Employee

I have attached recovery letter to exit employee.

August 1, 2012

Dear Nitin,

 

Please find enclosed herewith your final settlement on separation as per terms of appointment.

We wish to state that you have to pay Rs. 2347/- to the Company on final settlement.  Please arrange to pay the amount immediately to complete your relieving formalities.

The cheque may be made in favor of “_________________” and handed over to our representative at Delhi office.

 

Thanking you,

Yours truly,

 

 Click Here To Download Format for Recovery Letter

Be the first to comment - What do you think?
Posted by Hrformats - August 1, 2012 at 6:28 AM

Categories: HR   Tags: , , ,

Pay Roll Software in Excel

This Excel based Pay Roll software is more useful to all West Bengal Govt employees or West Bengal Govt Concerned who are prepared the Pay Bill as manually. This Excel Based Pay Roll Software can Prepare at a time the Employees Pay Inner Sheet + Pay Outer Sheet + GPF Schedule + Bill Extract + all the Papers as required by the Treasury Office for payment of Salary of Govt Employees.

Click Here To Download Pay Roll Software in Excel for W.B.Govt Employees

Be the first to comment - What do you think?
Posted by Hrformats - July 24, 2012 at 6:53 AM

Categories: HR   Tags: , , , , , , ,

Complete PF Withdrawal Procedure with Forms and Guidelines

1. PF Withdrawal upon resignation :

Upon resignation an employee can either withdraw or transfer his/her PF amounts at his desire.

a) For Withdrawal : In order to withdraw the PF/ Pension funds you have to submit form 19 and 10 C preferably through your employer. Depending upon the attitude and working capabilities of employees in the respective EPF Office, it will take 45 to 60 days to get your balance credited to your bank account.Withdrawals of PF can be done only after 60 days period after resignation.

Form No 19 is for Provident fund withdrawal & Form No. 10 C is for Pension scheme withdrawal. I have attached both the forms for your reference.

b) For Transfer : For transfer you have to get form 13 submitted through your present Company but you need to know your earlier PF a/c no.etc.
Also you need to provide following details to your current company.

Name and address of the previous company from which PF is still pending to be claimed.
Group Code of the previous company.
Date of Joining and date of leaving from previous company.
Your PF no from the previous company.

2. PF withdrawal during Working period :

The Provident Fund members can avail advances / partial withdrawals subject to certain conditions like Marriage for self and dependent sisters, brothers etc / purchasing of dwelling house or repayment of housing loan / specified medical treatments / Closure of establishment etc.,

You need to submit FORM 31 for claiming amount. But the PF authorities will sanction only if you satisfy the qualifying conditions. I have attached a document ” Guidelines for PF withdrawal” that gives you an clear idea like on what grounds can a employee withdraw PF during his/her working period.

Hope this information is of some use to you. Please add your comments and suggestions. Please correct us if we are wrong anywhere. We just shared what we knew.

 

Click Here To Download Guide Lines for PF Withdrawal

Download 10c form pension fund 132

Download 19 form withdrawal PF 127

Download 13 Revised Form

2 comments - What do you think?
Posted by Hrformats - July 23, 2012 at 4:49 AM

Categories: HR   Tags: , , , ,

EPFO Circular No.WSU/5(1)/2003/11146

Please find attached EPFO Circular No.WSU/5(1)/2003/11146 dated 20th July 2012 for your information.

 

Click Here To Download EPF Circular E Passbook For Members

Be the first to comment - What do you think?
Posted by Hrformats - July 21, 2012 at 8:02 AM

Categories: Hiring, HR   Tags: , , , ,

Policy For Cellular Sim Card

I have attached policy for mobile sim cards in company.

 

POLICY FOR CELLULAR SIM CARDS

 

1.               INTRODUCTION

 

Objective :

 

Amendment to certain changes in policy Ref 13 Jul arising out of clarity of identification of calls (personal/official) against the use of Company Sim Cards. This policy is designed to provide cellular Sim Card facility to all key functionaries of the organization, to empower them in attending official exigencies. The purpose of this policy is to facilitate the Employees in their jobs by increasing communication with the distribution network /trade and to prevent them from hassle of purchasing pre paid cards.

Eligibility

This policy applies to staff eligible as management consider appropriate.

 

RESPONSIBILITY

 

The preparation of this policy, procedure, forms, and letters, its revision along with justification & obtaining approval from the COO and its implementation and monitoring is the responsibility of CS Department.

  1. RULES AND REGULATIONS

The Company will provide the official SIM to all entitled staff.

 

This SIM is returnable upon transfer / discontinuation of the service to the company / company assigned person.

 

This facility is provided purely for official purpose. Though the company will pay the bills directly to the service provider, cost of all personal calls should be borne by the staff. The user must indicate their personal calls before the due date to CS Department (15th of every month).

 

 

The telephone bills will be available at the reception and individual members are responsible to collect the same by 1st of every month, mark the personal calls, value added services & sum the value for deduction on the bill with their signatures and return it to the Reception within three working days so that it can be collected by the representative of the HR department for further action.

 

In the event of non receipt of duly marked & signed bill before the due date, the CS department is authorized to deduct the entire bill amount (exceeding Rs 350/-) from the individual’s salary for the following month.

 

In case of loss of SIM, the employee must inform the CS Department as soon as possible to avoid any misuse of the SIM.

 

If any bill exceeds the maximum limit i.e. Rs 350/-then he/she will have to get necessary approvals from the reporting manager and need to identify all such official calls, Employees must provide a detailed copy of their bill to the CS Dept with the purpose of the call written next to the telephone number and the telephone number highlighted, otherwise the excess amount will be deducted from the subsequent month’s salary.

 

Value Added Services (viz., SMS, MMS, Downloads, etc.) will be debited to their respective personal account.

 

The company has implied authority to recover the cost of personal calls from the compensation payable to the employees.

 

The company reserves the sole right to modify or cancel the scheme at any time without giving any notice totally or individually.

 

___________________________________________________________

 

Click Here To Download Policy For Cellular Sim Card

Be the first to comment - What do you think?
Posted by Hrformats - July 13, 2012 at 8:22 AM

Categories: HR   Tags: , , , ,

« Previous PageNext Page »