[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference tnpubs::i-exchange

Title:I-TEAM/SES CONFERENCE
Moderator:TNPUBS::EWART
Created:Wed May 10 1995
Last Modified:Wed Nov 27 1996
Last Successful Update:Fri Jun 06 1997
Number of topics:49
Total number of notes:126

1.0. "Welcome and Introduction" by TNPUBS::SYSTEM () Wed May 10 1995 17:17

Welcome to the SES I-TEAM notes conference.


Who Is the	The I-Team is made up of two representatives from each CCC
I-Team?		in SES, and includes one moderator.  This is a "grass roots"
		effort made up of people with varied expertise who have
		volunteered their time and services to support YOU.


What Is Our	The purpose of the I-Team is to gather issues/problems that 
Purpose?		individual contributors within	SES are	facing everyday and 
		to offer or implement solutions	for solving them.
		
		Here's the type of issues/problems we hope will surface:

		* Work issues at the project level
		* Organizational and change issues
		* Other

		The I-Team anticipates working cooperatively with the EISE
		(Enriched Information & Support Environment) by exchanging
		related information.


How Can You	We need to hear from you.  To start, take a few minutes to 
Participate?	think about the three most important issues/problems you've 
		been facing in your job.  Feel free to offer suggestions as
		well.  Send them to one of the I-Team representatives from
		your CCC.


Who Are Your 	The following is a list of the I-Team representatives:
I-Team Reps?	
		-------------------------------------------------------------
		Individual	Node,DTN 		  CCC,CCC Manager
		-------------------------------------------------------------
		Nancy Lane     TNPUBS::LANE,381-1290	  Production,Popp
		Alice Phalen*  TNPUBS::PHALEN,226-7243	          "

		Bev Oliphant   MTWAIN::OLIPHANT,223-4563  Hardware,Petralia
		Tom Ewart*     TNPUBS::EWART,226-6829            "

		Bob Govoni     TNPUBS::GOVONI,227-3268	  Network SW,Baker
		Jon Patt       DELNI::PATT,381-2184		  "

		Barry Lein     META::LEIN,223-6934	  Sales/Services,
		Rachel Pantely DEMON::PANTELY,227-3740	  Costales

		Sarah Masella  CUPTAY::SMASELLA,227-4232  Systems,Stokes
		John Wyndham   SUPER::WYNDHAM,381-1569

		David Killelea VAXUUM::KILLELEA,381-2097
		-------------------------------------------------------------
		* Notes mods

    
T.RTitleUserPersonal
Name
DateLines
1.1Policy informationTNPUBS::EWARTWed May 10 1995 17:26127
 | Digital owns and operates computers, systems and networks
 | primarily to support the Company's business activities.  Systems
 | should be used to enhance the cost effectiveness and efficient
 | running of the business, to assist employees in being more
 | effective in executing their duties and responsibilities, to
 | enhance our employees' ability to operate our computer systems,
 | to foster appropriate open and efficient communications and to
 | perpetuate the use of computers in day-to-day activities.

 | Employees should remember that computers, systems and networks
 | like paper files, notebooks etc., are company assets provided to
 | employees to assist them in performing their work.  These tools,
 | and the work product they contain are Company property and
 | are therefore subject to Company review and control.  The
 | efficient operation of these vital resources is critical to the
 | success of the business, and it is therefore the responsibility
 | of all employees to use the computer resources provided to them
 | by the Company appropriately.

 Definitions 

 | For the purpose of this policy, improper use includes, but is not
 | limited to the use of Digital owned and/or operated systems,
 | networks and conferences for the purpose of gaining unauthorized
 | access to internal or external computer systems or accounts, for
 | personal purposes that are contrary to Company philosophy or
 | policy, for purposes that interfere or compete with the Company's
 | business activities, or for purposes of individual financial
 | gain.   Examples of misuse include, but are not limited to,
 | transmitting sexual or ethnic jokes or slurs, soliciting other
 | employees, developing chain letters, making defamatory
 | statements, disclosing private facts about any individual or
 | organization, inappropriate disclosure of Company Proprietary or
 | Confidential Information, permitting unauthorized access, etc.

 |     SYSTEMS MANAGERS - All employees must ensure that computers,
 |     systems and networks that they manage are clearly operating
 |     in support of Company business activities.  System Managers
 |     must immediately investigate and report any incident of
 |     misuse by an employee to the employee's manager.

 |     MANAGERS - Managers should periodically remind employees
 |     about the appropriate use of Company computer resources and,
 |     monitor these resources to insure that they are being used in
 |     accordance with this policy.

 |     EMPLOYEES - Employees are expected to use Company sponsored
 |     computer resources and their time at work (as determined by
 |     their manager) in accordance with this policy and to support
 |     Company business activities.  In addition, employees should
 |     report all potential misuse to their manager.

 |     CONFERENCE MODERATORS - Conference (Notesfile) moderators are
 |     expected to periodically review the contents of the
 |     conferences they moderate to insure that material contained
 |     in those files meet the letter and spirit of this policy.
 |     Moderators are expected to remove any material that does not
 |     comply with these standards, and should report violations of
 |     this policy to the appropriate systems or cost center
 |     manager.


 Notes Files/Conferences 

 | Digital provides systems to its employees to maintain computer
 | conferences (notesfiles) in direct support of Company business
 | (i.e., product development, financial analysis, business
 | planning, etc.).  Digital also permits access to these systems to
 | communicate matters of opinions and common interests.

 | In all cases a computer conference must have an identified
 | conference moderator as defined above.  Where the conference
 | directly supports the Company's business, the conference
 | moderator and the responsible systems manager may elect to
 | restrict access to the conference.  Digital classified
 | information may only be placed in a conference with restricted
 | access.  Conferences created to communicate matters of opinion
 | and common interests may not be used for solicitations of any
 | kind, and must be open to all employees.

 | In addition, these conferences may not be used to promote
 | behavior which is contrary to the Company's values or policy
 | (i.e., they may not promote discrimination, disrespect for the
 | individual, violence, etc.).  It is the responsibility of
 | employees who utilize such notes files to do so in a manner
 | consistent with both the letter and spirit of this policy and the
 | Company's values.  The Company reserves the right to terminate
 | any notesfile it believes is inappropriate or in violation of
 | this policy.

 Responsibility for Content of Messages Sent or Posted on Network 

 | Messages mailed or posted over the Digital network are the
 | responsibility of the original author.  Posting these materials
 | in a notesfile/conference without the explicit permission of the
 | author is prohibited and is a violation of this policy.

 | When forwarding messages or posting them to conferences, removal
 | or falsification of the original message header (which indicates
 | the author) is prohibited.

 Company Access 

 | Because networks, computer systems and accounts are resources the
 | Company provides to its employees, the Company reserves the right
 | to access those networks, systems and accounts as it deems
 | necessary.

 Policy Violations 

 | Managers who suspect systems are being used improperly should
 | discuss the problem with the employee in question and, if
 | appropriate, involve security.  In cases where improper use has
 | been clearly established, the employee should be dealt with in
 | accordance with the Corrective Action and Disciplinary Policy
 | (6.21).

 References 

 | Personnel Policies and Procedures Manual
 | Policy 6.03, Harassment;
 | Policy 6.06, Conflicts of Interest;
 | Policy 6.18, Employee Privacy;
 | Policy 6.21, Corrective Action and Discipline; and
 | Policy 6.24, Employee Conduct.


1.2EtiquetteTNPUBS::EWARTWed May 10 1995 17:2817
    While communicating by computer has many advantages, there are some
    drawbacks:

    o  Nonverbal cues (such as facial expression, intonation, and body
       language) that enhance face-to-face discussion are missing.

    o  Reading takes longer than listening, and reading a terminal screen
       for long periods of time may become tiring.

    o  Most terminal screens lack the ability to visually emphasize
       information or to express information graphically.

    This discussion is an excerpt from the section "Hints for Improving
    Computer-Mediated Communication" in Chapter 3 of the Guide to VAX Notes
    Manual. This series of notes gives you some hints for making sure your
    notes communicate your ideas effectively.