[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference quokka::colorado_singles

Title:Colorado_Singles
Moderator:COOKIE::DAY
Created:Tue Mar 03 1992
Last Modified:Tue Dec 17 1996
Last Successful Update:Fri Jun 06 1997
Number of topics:62
Total number of notes:248

2.0. "POLICIES AND PROCEDURES" by COOKIE::DAY (Leedy Day 523-3012 ESM Engineefing) Wed Mar 11 1992 11:02

    This note is reserved for use by the moderators to explain the Policies
    and Procedures that govern the use of this Conference.
    
    Please take the time to read the replies to this base note before
    making an entry or contacting someone who has made an entry.
T.RTitleUserPersonal
Name
DateLines
2.1COMPANY POLICY: COMPUTERS, SYSTEMS, NETWORKS"COOKIE::DAYLeedy Day 523-3012 ESM EngineefingWed Mar 11 1992 11:1285
Worldwide News                      LIVE WIRE                      26-SEP-1989

Updated worldwide policy on proper use of computers, systems, networks 

                                                                    page 1 of 5

 Digital has updated its worldwide policy defining the appropriate use of 
 its computers, systems and networks.  This version includes a philosophy 
 statement that reaffirms the importance of our systems and network 
 utilities as business tools.  It also defines "misuse" and spells out 
 the responsibilities of all employees and managers.

 The policy is effective immediately and will be available on VTX and
 hardcopy on or before November 1.

			Policy highlights 

Use of systems, cont'd                                           page 2 of 5

Philosophy

 Systems and network utilities are powerful business tools, encouraging 
 creativity and the exchange of ideas needed to maintain our competitive 
 edge.  These tools allow for instantaneous creation of "electronic" 
 organizations to focus worldwide resources on urgent tasks.  We want to 
 encourage our people to use these tools in accordance with company 
 philosophy and values.
 
 Our peer-to-peer, open computing environment reflects our corporate culture.  
 We sell this concept to customers, and business and society are clearly 
 moving toward this way of operating.  We believe that what we sell to our 
 customers will get better if we use it ourselves.

Use of systems, cont'd                                            page 3 of 5

 Information and the ability to communicate it freely are valuable assets 
 that play a significant role in Digital's success.  The protection and 
 appropriate use of these assets is everyone's responsibility.  We must strike 
 a balance between encouraging open systems and protecting these assets if they 
 are to continue to support our success.

Notes files and conferences

 Digital provides systems to its employees to maintain computer conferences 
 (notes files) in direct support of company business (i.e., product 
 development, financial analysis, business planning, etc.).  Digital also 
 permits access to these systems to communicate matters of opinions and 
 common interests.


Use of systems, cont'd                                           page 4 of 5

 In all cases, a computer conference must have an identified conference 
 moderator.  Where the conference directly supports the company's business, 
 the conference moderator and the responsible systems manager may elect to 
 restrict access to the conference.  Digital classified information may only 
 be placed in a conference with restricted access.  Conferences created to 
 communicate matters of opinion and common interests may not be used for 
 solicitations of any kind, and must be open to all employees.
 
 In addition, these conferences may not be used to promote behavior which is 
 contrary to the company's values or policy (i.e., they may not promote 
 discrimination, disrespect for the individual, violence, etc.). ... The 
 company reserves the right to terminate any notes file it believes is 
 inappropriate or in violation of this policy.


Use of systems, cont'd                                          page 5 of 5
 
Responsibility for content of messages sent or posted on the network

  Messages mailed or posted over the Digital network are the responsibility 
  of the original author.  Posting materials in a notes file/conference without 
  the explicit permission of the author is prohibited and is a violation of 
  this policy.  When forwarding messages or posting them to conferences, 
  removal or falsification of the original message header (which indicates 
  the author) is prohibited.	        
 
Policy violations
 
  Managers who suspect that systems are being used improperly should discuss 
  the problem with the employee in question and, if appropriate, involve 
  security.  In cases where improper use has been clearly established, the 
  employee should be dealt with in accordance with the corrective action and 
  disciplinary policy (6.21).
2.2JOHN SIMS REMINDER/COMPANY RULESCOOKIE::DAYLeedy Day 523-3012 ESM EngineefingWed Mar 11 1992 11:1681
                  I N T E R O F F I C E   M E M O R A N D U M

                                        Date:     30-Jan-1992 
                                        From:     John Sims
                                                  SIMS.JOHN AT A1 at CORA @ CORE
                                        Dept:     Strategic Resources
                                        Tel No:   223-7243

TO:  Employee Interest Notes File Participants 


Subject:  A message to employee interest notes file users                          

           A MESSAGE TO EMPLOYEE INTEREST NOTES FILE USERS
    
    
    Over the last few months I have received a number of complaints 
    from employees, and individuals outside of the company about 
    material communicated in electronic mail systems and posted in 
    various employee interest notes files.  After reading some of this 
    material it is clear that a reminder about appropriate comment and 
    behavior in these systems is necessary.
    
    First, and most critically; the electronic mail systems and notes 
    files are company facilities subject to normal workplace rules of 
    conduct.   As such, the same rules that govern conduct and comment 
    in any other Digital workplace apply with equal weight in these 
    systems.  Stated simply, if you wouldn't say something in a 
    Digital business meeting, you shouldn't say it in electronic mail 
    or notes. PERIOD.  
    
    Statements that attribute improper, illegal or immoral motives or 
    actions to others; statements that cast aspersions on the 
    character or integrity of others or that amount to libel or 
    slander are not permitted. PERIOD.  In this regard, it does not 
    matter whether the individuals subject to the comment are elected 
    public officials or directors of organizations disfavored by the 
    author.   There is no "Public Figure" exception in these systems.
    
    Comments of a sexual nature are not acceptable whether they are 
    about the author or directed at others.  Similarly, comments that 
    degrade, devalue or discriminate against others are also 
    prohibited.
    
    Neither the notes conferences nor electronic mail should be used 
    to solicit other employees.  This prohibition covers efforts to 
    solicit employees for personal or political gain, to sell or 
    market goods or services (except authorized marketplace or 
    discount conferences) and efforts to solicit employees to take 
    action, sign petitions or support particular causes or candidates.
    
    Finally, employees should remember that it is never appropriate to 
    spend working time in employee interest notes for non-work 
    purposes.  Personal or entertainment activities in these notes 
    files should be limited to assigned break times, lunch time and 
    before or after business hours.  
    
    Employee interest notes files and conferences provide an 
    electronic forum to share ideas and opinions about matters of 
    common interest.  In supporting these conferences, the company 
    understood that there would be occasions where employees would 
    disagree on issues being discussed, but we believed and continue 
    to believe it is possible to disagree without being disagreeable.  
    Personnel Policy 6.54, Proper Use of Digital Computers, Systems 
    and Networks provides further information about appropriate 
    conduct and comment in these systems.  Employees who fail to meet 
    these expectations, or who use company computer systems in ways 
    that are contrary to the letter or spirit of that policy are 
    subject to Corrective Action and Discipline up to and including 
    the termination of their employment.
    
    The moderators of these conferences, along with your system 
    managers, personnel representatives and the Personnel Policy 
    Manager are all available to answer any question you might have 
    about appropriate use of these systems.
    
    Please feel free to forward this memo to other Digital notes files 
    and conferences.