| | Digital owns and operates computers, systems and networks
| primarily to support the Company's business activities. Systems
| should be used to enhance the cost effectiveness and efficient
| running of the business, to assist employees in being more
| effective in executing their duties and responsibilities, to
| enhance our employees' ability to operate our computer systems,
| to foster appropriate open and efficient communications and to
| perpetuate the use of computers in day-to-day activities.
| Employees should remember that computers, systems and networks
| like paper files, notebooks etc., are company assets provided to
| employees to assist them in performing their work. These tools,
| and the work product they contain are Company property and
| are therefore subject to Company review and control. The
| efficient operation of these vital resources is critical to the
| success of the business, and it is therefore the responsibility
| of all employees to use the computer resources provided to them
| by the Company appropriately.
Definitions
| For the purpose of this policy, improper use includes, but is not
| limited to the use of Digital owned and/or operated systems,
| networks and conferences for the purpose of gaining unauthorized
| access to internal or external computer systems or accounts, for
| personal purposes that are contrary to Company philosophy or
| policy, for purposes that interfere or compete with the Company's
| business activities, or for purposes of individual financial
| gain. Examples of misuse include, but are not limited to,
| transmitting sexual or ethnic jokes or slurs, soliciting other
| employees, developing chain letters, making defamatory
| statements, disclosing private facts about any individual or
| organization, inappropriate disclosure of Company Proprietary or
| Confidential Information, permitting unauthorized access, etc.
| SYSTEMS MANAGERS - All employees must ensure that computers,
| systems and networks that they manage are clearly operating
| in support of Company business activities. System Managers
| must immediately investigate and report any incident of
| misuse by an employee to the employee's manager.
| MANAGERS - Managers should periodically remind employees
| about the appropriate use of Company computer resources and,
| monitor these resources to insure that they are being used in
| accordance with this policy.
| EMPLOYEES - Employees are expected to use Company sponsored
| computer resources and their time at work (as determined by
| their manager) in accordance with this policy and to support
| Company business activities. In addition, employees should
| report all potential misuse to their manager.
| CONFERENCE MODERATORS - Conference (Notesfile) moderators are
| expected to periodically review the contents of the
| conferences they moderate to insure that material contained
| in those files meet the letter and spirit of this policy.
| Moderators are expected to remove any material that does not
| comply with these standards, and should report violations of
| this policy to the appropriate systems or cost center
| manager.
Notes Files/Conferences
| Digital provides systems to its employees to maintain computer
| conferences (notesfiles) in direct support of Company business
| (i.e., product development, financial analysis, business
| planning, etc.). Digital also permits access to these systems to
| communicate matters of opinions and common interests.
| In all cases a computer conference must have an identified
| conference moderator as defined above. Where the conference
| directly supports the Company's business, the conference
| moderator and the responsible systems manager may elect to
| restrict access to the conference. Digital classified
| information may only be placed in a conference with restricted
| access. Conferences created to communicate matters of opinion
| and common interests may not be used for solicitations of any
| kind, and must be open to all employees.
| In addition, these conferences may not be used to promote
| behavior which is contrary to the Company's values or policy
| (i.e., they may not promote discrimination, disrespect for the
| individual, violence, etc.). It is the responsibility of
| employees who utilize such notes files to do so in a manner
| consistent with both the letter and spirit of this policy and the
| Company's values. The Company reserves the right to terminate
| any notesfile it believes is inappropriate or in violation of
| this policy.
Responsibility for Content of Messages Sent or Posted on Network
| Messages mailed or posted over the Digital network are the
| responsibility of the original author. Posting these materials
| in a notesfile/conference without the explicit permission of the
| author is prohibited and is a violation of this policy.
| When forwarding messages or posting them to conferences, removal
| or falsification of the original message header (which indicates
| the author) is prohibited.
Company Access
| Because networks, computer systems and accounts are resources the
| Company provides to its employees, the Company reserves the right
| to access those networks, systems and accounts as it deems
| necessary.
Policy Violations
| Managers who suspect systems are being used improperly should
| discuss the problem with the employee in question and, if
| appropriate, involve security. In cases where improper use has
| been clearly established, the employee should be dealt with in
| accordance with the Corrective Action and Disciplinary Policy
| (6.21).
References
| Personnel Policies and Procedures Manual
| Policy 6.03, Harassment;
| Policy 6.06, Conflicts of Interest;
| Policy 6.18, Employee Privacy;
| Policy 6.21, Corrective Action and Discipline; and
| Policy 6.24, Employee Conduct.
|