[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference acadmy::tpas_notes

Title:Transfer Price Administration System
Notice:Conference has moved to ACADMY::TPAS_NOTES
Moderator:ACADMY::MAGNI
Created:Wed Jul 01 1992
Last Modified:Fri Mar 21 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:102
Total number of notes:459

2.0. "Personnel Polocies & Procedures" by AWARD::MAGNI (EWIS - APPIX/FMAP in MSO2) Wed Jul 01 1992 10:27

                  I N T E R O F F I C E   M E M O R A N D U M

                                        Date:     30-Jan-1992 
                                        From:     John Sims
                                                  SIMS.JOHN AT A1 at CORA @ CORE
                                        Dept:     Strategic Resources
                                        Tel No:   223-7243

TO:  Employee Interest Notes File Participants 


Subject:  A message to employee interest notes file users

           A MESSAGE TO EMPLOYEE INTEREST NOTES FILE USERS
    
    
    Over the last few months I have received a number of complaints 
    from employees, and individuals outside of the company about 
    material communicated in electronic mail systems and posted in 
    various employee interest notes files.  After reading some of this 
    material it is clear that a reminder about appropriate comment and 
    behavior in these systems is necessary.
    
    First, and most critically; the electronic mail systems and notes 
    files are company facilities subject to normal workplace rules of 
    conduct.   As such, the same rules that govern conduct and comment 
    in any other Digital workplace apply with equal weight in these 
    systems.  Stated simply, if you wouldn't say something in a 
    Digital business meeting, you shouldn't say it in electronic mail 
    or notes. PERIOD.  
    
    Statements that attribute improper, illegal or immoral motives or 
    actions to others; statements that cast aspersions on the 
    character or integrity of others or that amount to libel or 
    slander are not permitted. PERIOD.  In this regard, it does not 
    matter whether the individuals subject to the comment are elected 
    public officials or directors of organizations disfavored by the 
    author.   There is no "Public Figure" exception in these systems.
    
    Comments of a sexual nature are not acceptable whether they are 
    about the author or directed at others.  Similarly, comments that 
    degrade, devalue or discriminate against others are also 
    prohibited.
    
    Neither the notes conferences nor electronic mail should be used 
    to solicit other employees.  This prohibition covers efforts to 
    solicit employees for personal or political gain, to sell or 
    market goods or services (except authorized marketplace or 
    discount conferences) and efforts to solicit employees to take 
    action, sign petitions or support particular causes or candidates.
    
    Finally, employees should remember that it is never appropriate to 
    spend working time in employee interest notes for non-work 
    purposes.  Personal or entertainment activities in these notes 
    files should be limited to assigned break times, lunch time and 
    before or after business hours.  
    
    Employee interest notes files and conferences provide an 
    electronic forum to share ideas and opinions about matters of 
    common interest.  In supporting these conferences, the company 
    understood that there would be occasions where employees would 
    disagree on issues being discussed, but we believed and continue 
    to believe it is possible to disagree without being disagreeable.  
    Personnel Policy 6.54, Proper Use of Digital Computers, Systems 
    and Networks provides further information about appropriate 
    conduct and comment in these systems.  Employees who fail to meet 
    these expectations, or who use company computer systems in ways 
    that are contrary to the letter or spirit of that policy are 
    subject to Corrective Action and Discipline up to and including 
    the termination of their employment.
    
    The moderators of these conferences, along with your system 
    managers, personnel representatives and the Personnel Policy 
    Manager are all available to answer any question you might have 
    about appropriate use of these systems.
    
    
T.RTitleUserPersonal
Name
DateLines
2.1Policy Section 6.54AWARD::MAGNIEWIS - APPIX/FMAP in MSO2Wed Jul 01 1992 10:2967
		PERSONNEL Policies and Procedures	Section 6.54
							Date 17 Nov 86

 
PROPER USE OF DIGITAL COMPUTERS, SYSTEMS AND NETWORKS 
 
POLICY
 
Digital owns and operates  computers, systems and networks in support of
Company business activities.  Systems should be used to enhance the cost
effectiveness and efficient running of the business, to assist employees
in being more effective in executing their  duties and responsibilities,
to  foster  appropriate  open  and  efficient  communications  and    to
perpetuate the use of computers in day to day activities.  The efficient
operation  of  these vital resources is critical to the success  of  the
business.    Therefore,  it  is  the  responsibility of all employees to
insure that these resources are being used properly. 
 
DEFINITION
 
For purposes  of  this policy, improper use includes, but is not limited
to, the use  of  Digital  owned  and/or  operated  computer  systems and
networks for the purpose  of  gaining unauthorized access to internal or
external computer systems or accounts,  for  personal  purposes that are
contrary to Company philosophy or policy,  for  purposes  that interfere
with the Company's business activities, or for  purposes  of  individual
financial  gain.   Examples of misuse could be  transmitting  offensive,
harassing  and/or  devaluing  statements,  developing  and  transmitting
inappropriate graphics, transmitting  sexual  or  ethnic slurs or jokes,
soliciting  other  employees, developing  chain  letters,  communicating
matters  of private conviction or  philosophy,  permitting  unauthorized
access, etc. 
 
RESPONSIBILITIES
 
INFORMATION SYSTEM MANAGERS:  Information Systems  Managers  must ensure
that  computers,  systems  and  networks that they  manage  are  clearly
operating  in  support of Company business activities.   This  could  be
accomplished  by  reviewing equipment usage and educating users, issuing
periodic systems management  advisories.    Information Systems Managers
will also immediately investigate  and  report any incident of misuse by
an employee to the employee's manager. 
 
MANAGERS:    Managers should periodically  remind  employees  about  the
proper use of Company computer resources  and  with proper consideration
of employee privacy, monitor these resources to  insure  that  they  are
being used in accordance with this policy.  Additionally, in cases where
there is suspicion of improper use, managers should discuss  the problem
with  the  employee  in question, and, if appropriate, involve Security.
In  cases  where improper use has been clearly established, the employee
should  be  dealt  with  in  accordance  with  the Corrective Action and
Disciplinary Policy (6.21). 
 
EMPLOYEES:   Employees  are  expected  to use Company sponsored computer
resources in accordance with this policy and to support company business
activities.  In addition,  employees  should report all potential misuse
to the appropriate Information Systems Manager and/or their supervisor. 
 
REFERENCES
 
Personnel  Policies  and Procedures Manual;    Policy  6.03,  Harassment
Policy;  Policy 6.06, Conflict of  Interest  Policy;    6.21, Corrective
Action and Discipline;  Policy 6.24, Employee  Responsibility;    Policy
6.18, Employee Privacy.