| Title: | Transfer Price Administration System |
| Notice: | Conference has moved to ACADMY::TPAS_NOTES |
| Moderator: | ACADMY::MAGNI |
| Created: | Wed Jul 01 1992 |
| Last Modified: | Fri Mar 21 1997 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 102 |
| Total number of notes: | 459 |
I N T E R O F F I C E M E M O R A N D U M
Date: 30-Jan-1992
From: John Sims
SIMS.JOHN AT A1 at CORA @ CORE
Dept: Strategic Resources
Tel No: 223-7243
TO: Employee Interest Notes File Participants
Subject: A message to employee interest notes file users
A MESSAGE TO EMPLOYEE INTEREST NOTES FILE USERS
Over the last few months I have received a number of complaints
from employees, and individuals outside of the company about
material communicated in electronic mail systems and posted in
various employee interest notes files. After reading some of this
material it is clear that a reminder about appropriate comment and
behavior in these systems is necessary.
First, and most critically; the electronic mail systems and notes
files are company facilities subject to normal workplace rules of
conduct. As such, the same rules that govern conduct and comment
in any other Digital workplace apply with equal weight in these
systems. Stated simply, if you wouldn't say something in a
Digital business meeting, you shouldn't say it in electronic mail
or notes. PERIOD.
Statements that attribute improper, illegal or immoral motives or
actions to others; statements that cast aspersions on the
character or integrity of others or that amount to libel or
slander are not permitted. PERIOD. In this regard, it does not
matter whether the individuals subject to the comment are elected
public officials or directors of organizations disfavored by the
author. There is no "Public Figure" exception in these systems.
Comments of a sexual nature are not acceptable whether they are
about the author or directed at others. Similarly, comments that
degrade, devalue or discriminate against others are also
prohibited.
Neither the notes conferences nor electronic mail should be used
to solicit other employees. This prohibition covers efforts to
solicit employees for personal or political gain, to sell or
market goods or services (except authorized marketplace or
discount conferences) and efforts to solicit employees to take
action, sign petitions or support particular causes or candidates.
Finally, employees should remember that it is never appropriate to
spend working time in employee interest notes for non-work
purposes. Personal or entertainment activities in these notes
files should be limited to assigned break times, lunch time and
before or after business hours.
Employee interest notes files and conferences provide an
electronic forum to share ideas and opinions about matters of
common interest. In supporting these conferences, the company
understood that there would be occasions where employees would
disagree on issues being discussed, but we believed and continue
to believe it is possible to disagree without being disagreeable.
Personnel Policy 6.54, Proper Use of Digital Computers, Systems
and Networks provides further information about appropriate
conduct and comment in these systems. Employees who fail to meet
these expectations, or who use company computer systems in ways
that are contrary to the letter or spirit of that policy are
subject to Corrective Action and Discipline up to and including
the termination of their employment.
The moderators of these conferences, along with your system
managers, personnel representatives and the Personnel Policy
Manager are all available to answer any question you might have
about appropriate use of these systems.
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 2.1 | Policy Section 6.54 | AWARD::MAGNI | EWIS - APPIX/FMAP in MSO2 | Wed Jul 01 1992 09:29 | 67 |
PERSONNEL Policies and Procedures Section 6.54 Date 17 Nov 86 PROPER USE OF DIGITAL COMPUTERS, SYSTEMS AND NETWORKS POLICY Digital owns and operates computers, systems and networks in support of Company business activities. Systems should be used to enhance the cost effectiveness and efficient running of the business, to assist employees in being more effective in executing their duties and responsibilities, to foster appropriate open and efficient communications and to perpetuate the use of computers in day to day activities. The efficient operation of these vital resources is critical to the success of the business. Therefore, it is the responsibility of all employees to insure that these resources are being used properly. DEFINITION For purposes of this policy, improper use includes, but is not limited to, the use of Digital owned and/or operated computer systems and networks for the purpose of gaining unauthorized access to internal or external computer systems or accounts, for personal purposes that are contrary to Company philosophy or policy, for purposes that interfere with the Company's business activities, or for purposes of individual financial gain. Examples of misuse could be transmitting offensive, harassing and/or devaluing statements, developing and transmitting inappropriate graphics, transmitting sexual or ethnic slurs or jokes, soliciting other employees, developing chain letters, communicating matters of private conviction or philosophy, permitting unauthorized access, etc. RESPONSIBILITIES INFORMATION SYSTEM MANAGERS: Information Systems Managers must ensure that computers, systems and networks that they manage are clearly operating in support of Company business activities. This could be accomplished by reviewing equipment usage and educating users, issuing periodic systems management advisories. Information Systems Managers will also immediately investigate and report any incident of misuse by an employee to the employee's manager. MANAGERS: Managers should periodically remind employees about the proper use of Company computer resources and with proper consideration of employee privacy, monitor these resources to insure that they are being used in accordance with this policy. Additionally, in cases where there is suspicion of improper use, managers should discuss the problem with the employee in question, and, if appropriate, involve Security. In cases where improper use has been clearly established, the employee should be dealt with in accordance with the Corrective Action and Disciplinary Policy (6.21). EMPLOYEES: Employees are expected to use Company sponsored computer resources in accordance with this policy and to support company business activities. In addition, employees should report all potential misuse to the appropriate Information Systems Manager and/or their supervisor. REFERENCES Personnel Policies and Procedures Manual; Policy 6.03, Harassment Policy; Policy 6.06, Conflict of Interest Policy; 6.21, Corrective Action and Discipline; Policy 6.24, Employee Responsibility; Policy 6.18, Employee Privacy. | |||||