Title: | Transfer Price Administration System |
Notice: | Conference has moved to ACADMY::TPAS_NOTES |
Moderator: | ACADMY::MAGNI |
Created: | Wed Jul 01 1992 |
Last Modified: | Fri Mar 21 1997 |
Last Successful Update: | Fri Jun 06 1997 |
Number of topics: | 102 |
Total number of notes: | 459 |
I N T E R O F F I C E M E M O R A N D U M Date: 30-Jan-1992 From: John Sims SIMS.JOHN AT A1 at CORA @ CORE Dept: Strategic Resources Tel No: 223-7243 TO: Employee Interest Notes File Participants Subject: A message to employee interest notes file users A MESSAGE TO EMPLOYEE INTEREST NOTES FILE USERS Over the last few months I have received a number of complaints from employees, and individuals outside of the company about material communicated in electronic mail systems and posted in various employee interest notes files. After reading some of this material it is clear that a reminder about appropriate comment and behavior in these systems is necessary. First, and most critically; the electronic mail systems and notes files are company facilities subject to normal workplace rules of conduct. As such, the same rules that govern conduct and comment in any other Digital workplace apply with equal weight in these systems. Stated simply, if you wouldn't say something in a Digital business meeting, you shouldn't say it in electronic mail or notes. PERIOD. Statements that attribute improper, illegal or immoral motives or actions to others; statements that cast aspersions on the character or integrity of others or that amount to libel or slander are not permitted. PERIOD. In this regard, it does not matter whether the individuals subject to the comment are elected public officials or directors of organizations disfavored by the author. There is no "Public Figure" exception in these systems. Comments of a sexual nature are not acceptable whether they are about the author or directed at others. Similarly, comments that degrade, devalue or discriminate against others are also prohibited. Neither the notes conferences nor electronic mail should be used to solicit other employees. This prohibition covers efforts to solicit employees for personal or political gain, to sell or market goods or services (except authorized marketplace or discount conferences) and efforts to solicit employees to take action, sign petitions or support particular causes or candidates. Finally, employees should remember that it is never appropriate to spend working time in employee interest notes for non-work purposes. Personal or entertainment activities in these notes files should be limited to assigned break times, lunch time and before or after business hours. Employee interest notes files and conferences provide an electronic forum to share ideas and opinions about matters of common interest. In supporting these conferences, the company understood that there would be occasions where employees would disagree on issues being discussed, but we believed and continue to believe it is possible to disagree without being disagreeable. Personnel Policy 6.54, Proper Use of Digital Computers, Systems and Networks provides further information about appropriate conduct and comment in these systems. Employees who fail to meet these expectations, or who use company computer systems in ways that are contrary to the letter or spirit of that policy are subject to Corrective Action and Discipline up to and including the termination of their employment. The moderators of these conferences, along with your system managers, personnel representatives and the Personnel Policy Manager are all available to answer any question you might have about appropriate use of these systems.
T.R | Title | User | Personal Name | Date | Lines |
---|---|---|---|---|---|
2.1 | Policy Section 6.54 | AWARD::MAGNI | EWIS - APPIX/FMAP in MSO2 | Wed Jul 01 1992 10:29 | 67 |
PERSONNEL Policies and Procedures Section 6.54 Date 17 Nov 86 PROPER USE OF DIGITAL COMPUTERS, SYSTEMS AND NETWORKS POLICY Digital owns and operates computers, systems and networks in support of Company business activities. Systems should be used to enhance the cost effectiveness and efficient running of the business, to assist employees in being more effective in executing their duties and responsibilities, to foster appropriate open and efficient communications and to perpetuate the use of computers in day to day activities. The efficient operation of these vital resources is critical to the success of the business. Therefore, it is the responsibility of all employees to insure that these resources are being used properly. DEFINITION For purposes of this policy, improper use includes, but is not limited to, the use of Digital owned and/or operated computer systems and networks for the purpose of gaining unauthorized access to internal or external computer systems or accounts, for personal purposes that are contrary to Company philosophy or policy, for purposes that interfere with the Company's business activities, or for purposes of individual financial gain. Examples of misuse could be transmitting offensive, harassing and/or devaluing statements, developing and transmitting inappropriate graphics, transmitting sexual or ethnic slurs or jokes, soliciting other employees, developing chain letters, communicating matters of private conviction or philosophy, permitting unauthorized access, etc. RESPONSIBILITIES INFORMATION SYSTEM MANAGERS: Information Systems Managers must ensure that computers, systems and networks that they manage are clearly operating in support of Company business activities. This could be accomplished by reviewing equipment usage and educating users, issuing periodic systems management advisories. Information Systems Managers will also immediately investigate and report any incident of misuse by an employee to the employee's manager. MANAGERS: Managers should periodically remind employees about the proper use of Company computer resources and with proper consideration of employee privacy, monitor these resources to insure that they are being used in accordance with this policy. Additionally, in cases where there is suspicion of improper use, managers should discuss the problem with the employee in question, and, if appropriate, involve Security. In cases where improper use has been clearly established, the employee should be dealt with in accordance with the Corrective Action and Disciplinary Policy (6.21). EMPLOYEES: Employees are expected to use Company sponsored computer resources in accordance with this policy and to support company business activities. In addition, employees should report all potential misuse to the appropriate Information Systems Manager and/or their supervisor. REFERENCES Personnel Policies and Procedures Manual; Policy 6.03, Harassment Policy; Policy 6.06, Conflict of Interest Policy; 6.21, Corrective Action and Discipline; Policy 6.24, Employee Responsibility; Policy 6.18, Employee Privacy. |