[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference 7.286::digital

Title:The Digital way of working
Moderator:QUARK::LIONELON
Created:Fri Feb 14 1986
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:5321
Total number of notes:139771

144.0. "Death of Notes?" by EXIT26::FREDRIKSEN () Tue Jun 24 1986 21:16

The following text is verbatim from a memo I just received.  The 
original memo was written by Michael Carter of Corp. Security.  
If this doesn't spell the death knell for Notes, I don't know 
what will.




Following is the approved subject Personnel Policy Statement.  It 
will be published in the August update to the Personnel Policies 
and Procedures manual.  

     MISUSE OF DIGITAL COMPUTERS, SYSTEMS AND NETWORKS

POLICY

Digital owns and operates computers, systems and networks in 
support of Company business activities.  The efficient operation 
of these vital resources is critical to the success of the 
business.  Therefore, it is the responsibility of all employees 
to ensure that these resources are being used properly.

DEFINITION

For this policy, misuse includes, but is not limited to, the use 
of Digital owned and/or operated computer systems and networks 
for the purpose of gaining unauthorized access to internal or 
external computer systems or accounts, for purely personal 
purposes, for purposes that are not in support of the Company's 
business activities, for purposes that are contrary to Company 
Philosophy or Policy, or for purposes of individual financial 
gain.  Examples of misuse could be transmitting offensive, 
harassing and/or devaluing statements, developing and 
transmitting inappropriate graphics, transmitting sexual or 
ethnic slurs or jokes, soliciting other employees, developing 
chain letters, communicating matters of private conviction or 
philosophy which is unrelated to the business, permitting 
unauthorized access, etc.

RESPONSIBILITIES

Information System Managers:  Information System Managers must 
ensure that computers, systems and networks that they manage are 
clearly operating in support of company business activities.  
This would include reviewing equipment usage and educating users, 
issuing periodic systems management advisories.  Information 
Systems Managers will also immediately investigate and report any 
incident of misuse by an employee to the employee's manager.

Managers:  Managers should periodically remind employees about 
Digital's policy governing the use of Company computer resources 
and should periodically monitor the use of these resources to 
insure that they are not being used in violation of this policy.  
In addition, managers of employees, who there is reason to 
believe are guilty of misuse, must discuss the situation with the 
employee.  If it is established that misuse has clearly occurred, 
the employee must be dealt with in accordance with the Corrective 
Action and Disciplinary Policy (6.21).

Employee:  Employees are expected to use Company sponsored 
computer resources only to support company business activities.  
In addition, employees should report all potential misuses to the 
appropriate Information Systems Manager and/or their supervisor.

REFERENCES:

Personnel Policies and Procedures Manual; Policy 6.03, Harassment 
Policy; Policy 6.06, Conflict of Interest; Policy 6.21, 
Correction Action and Discipline; Policy 6.24, Employee 
Responsibility.

     
T.RTitleUserPersonal
Name
DateLines
144.1Report much exaggeratedVMSINT::SZETOSimon SzetoTue Jun 24 1986 22:4813
    This memo is more than one month old.  It has been misinterpreted.
    I have spoken to Mike Carter and he agrees.  A new version of the
    policy is being written that makes it less likely to interpret it
    as the doom-and-gloom death knell message.
    
    I realize that until Mike issues another revision, people will be
    skeptical of this.  Trust me.
    
  --Simon
    
    P.S. See note 111.160 in this file and compare it with the topic
    note (144.0).  You will see that it is the same. 
    
144.2The real danger...HUMAN::BURROWSJim BurrowsTue Jun 24 1986 22:573
        If we don't read old notes, we're doomed to repeat them.
        
        JimB.
144.3It is not finalHITECH::BLOTCKYWed Jul 23 1986 01:326
As far as I can tell, the policy never took effect company wide.
I have already seen a revised policy, which I won't post here because it 
is STILL A DRAFT and I don't want to create any more confusion than there 
already is. 

Steve
144.4Notes is born againHUMAN::CONKLINPeter ConklinWed Jul 23 1986 03:452
    Just the opposite. IDECUS has approved the existence of the Notes
    DIG. See 158.0