[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference hydra::dejavu

Title:Psychic Phenomena
Notice:Please read note 1.0-1.* before writing
Moderator:JARETH::PAINTER
Created:Wed Jan 22 1986
Last Modified:Tue May 27 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:2143
Total number of notes:41773

122.0. "Ill Omen?" by INK::KALLIS () Thu May 01 1986 10:16

    There's a point of specific interest to all those involved with
    non-work-related noting activity.  A controversy about these files
    was raised through an unfortunate incident with the SEXCETERA.NOT
    file.
    
    A rather full discussion is currently raging in HUMAN::DIGITAL note
    111.  Some of the responses have been thoughtful; others have shed
    more light than heat.
    
    My suggestion: read it, don't get too excited [yet], but enable
    "alert caution."
    
    Steve Kallis, Jr.
    
T.RTitleUserPersonal
Name
DateLines
122.1OOOoops!INK::KALLISThu May 01 1986 10:198
    Chthon!  I meant "More heat than light" in the above.  Tells you
    what happens when one writes while distracted. <sigh>
    
    Steve Kallis, Jr.
    
    P.S.:  I'd suspect this to be one of the more controversial files.
    -S
    
122.2Can't Get There for NowHYSTER::HITCHCOCKChuck HitchcockFri May 02 1986 13:476
Whenever I try to access HUMAN::DIGITAL it doesn't let me in.  At 
VMS I can do a directory of the system using Phone, so I know it 
isn't a network or system problem.  Is the D. notesfile locked 
out in some way during working hours?

/chuck
122.3Why you can't get there for now.PBSVAX::COOPERTopher CooperFri May 02 1986 14:0533
RE:.-1

The following notes appeared today in EASYNET_CONFERENCES.NOTE (the central
shopping list for the EASNET public conferences).  I think it explains
your problem.

		Topher

-------------------------------------------------------------------------------

             <<< TLE::PUBD$:[VAXNOTES]EASYNET_CONFERENCES.NOTE;2 >>>
                       -< EasyNet Conference Directory >-
================================================================================
Note 249.1               The Digital style of working                     1 of 2
VMSINT::SZETO "Simon Szeto"                           4 lines   2-MAY-1986 11:30
                                -< Too popular >-
--------------------------------------------------------------------------------

    Please limit access to this conference, particularly topic 111,
    to "off hours."  HUMAN is severely bogged down because everybody
    is trying to get in on that discussion.
    
================================================================================
Note 249.2               The Digital style of working                     2 of 2
TBD::ZAHAREE "Michael W. Zaharee"                     5 lines   2-MAY-1986 11:41
                             -< WAY too popular. >-
--------------------------------------------------------------------------------

    DIGITAL.NOTE has been renamed to allow activity to die down long
    enough for us to implement something to limit access to off hours.
    Sorry for any inconvenience.
    
    - M
122.5The squeeky wheel gets the axeVIKING::TBAKERTom BakerSat May 03 1986 17:0617
    
    I can't see that this would be a prime target for censorship.  The
    topics are generally inoffensive and handled in a mature manner.
    
    Most of all, however,  many people who have anything to do with
    the occult or psychic stuff have learned long ago not to blab about
    it.  I'm not inclined to copy  or print any of these notes and show
    it to anyone unless I'm pretty sure the other person:
    
    	1. is open to such things    and
    	2. wouldn't be offended by it.
    
    Indiscretion is what hit SEXCETERA.  Indiscreet psychics aren't
    usually indiscreet for long.
    
    Tom
    
122.6Just In CaseINK::KALLISMon May 05 1986 09:1315
    Re .4, .5:
    
    According top the last entry I saw in DIGITAL.NOT 111, the SEXCETERA
    file was closed, a hard-copy printout of the entire file was taken
    by Security, and it's been sent "very high up" in the corporation.
    
    How this affects DEJAVU.NOT isn't clear, since Tom is correct; however,
    it _might_ be removed from public-access notes.  If it cbecomes
    a private file (such exist already), I hope the moderator(s) will
    let us know how we can "get together" again.
    
    In case of the worst, let's all try to stay in touch.
    
    Steve Kallis, Jr.
    
122.8Contingency Plan Needed: Quickly!INK::KALLISThu May 15 1986 12:0725
    Re .7:
    
    It might be that the ill omen is getting larger.  Check out
    HUMAN::DIGITAL note 111.160 for details.  If indeed the policy goes
    into effect, then let's make some sort of contingency plan to save
    what's already been written so that each of us who wants a copy
    can get one.
    
    Outside of that:
    
    Think _positive_ thoughts about the _legitimate_ retention of this
    file, somehow. Those of us who do such things, direct positive energy
    in towards that goal.
    
    Do _not_ think negative thoughts, curse, or otherwise wish evil
    on the turkey whose thoughtless action created this situation. 
    Whatever bad you think will be returned threefold, so keep it nice.
    That doesn't mean we cant believe the act was wrong and that ity
    hurt a lot of people.
    
    Blessings on all you participants,
    and I hope we will be able to continue to meet.
    
    Steve Kallis, Jr.
    
122.9HUMAN::DIGITAL note 111.160HUDSON::STANLEYASTRAl projectionistThu May 15 1986 12:3271
    For those of you who haven't been able to get into HUMAN::DIGITAL,
    here is what note 111.160 says:
    

Following is the approved subject Personnel Policy Statement. It 
will be published in the August update to the Personnel Policies and 
Procedures manual.  Please distribute this throughout your 
organizations.

The DIS Policy, same subject, is in the process of update and will be 
distributed shortly.

Regards.
*************************************************************************

	  MISUSE OF DIGITAL COMPUTERS, SYSTEMS AND NETWORKS

POLICY

Digital owns and operates computers, systems and networks in support 
of Company business activities.  The efficient operation of these 
vital resources is critical to the success of the business.  
Therefore, it is the responsibility of all employees to ensure that 
these resources are being used properly.

DEFINITION

For this policy, misuse includes, but is not limited to, the use of 
Digital owned and/or operated computer systems and networks for the 
purpose of gaining unauthorized access to internal or external 
computer systems or accounts, for purely personal purposes, for 
purposes that are not in support of the Company's business activities, 
for purposes that are contrary to Company Philosophy or Policy, or for 
purposes of individual financial gain.  Examples of misuse could be 
transmitting offensive, harassing and/or devaluing statements, 
developing and transmitting inappropriate graphics, transmitting 
sexual or ethnic slurs or jokes, soliciting other employees, developing 
chain letters, communicating matters of private conviction or 
philosphy which is unrelated to the business, permitting unauthorized 
access, etc.

RESPONSIBILITIES

Information Systems Managers:  Information Systems Managers must 
ensure that computers, systems and networks that they manage are 
clearly operating in support of company business activities.  This 
would include reviewing equipment usage and educating users, issuing 
periodic systems management advisories.  Information Systems Managers 
will also immediately investigate and report any incident of misuse 
by an employee to the employee's manager.

Managers:  Managers should periodically remind employees about 
Digital's policy governing the use of Company computer resources and 
should periodically monitor the use of these resources to insure that 
they are not being used in violation of this policy.  In addition, 
managers of employees, who there is reason to believe are guilty of 
misuse, must discuss the situation with the employee.  If it is 
established that misuse has clearly occurred, the employee must be 
dealt with in accordance with the Corrective Action and Disciplinary 
Policy ( 6.21).

Employee:  Employees are expected to use Company sponsored computer 
resources only to support company business activities.  In addition, 
employees should report all potential misuses to the appropriate 
Information Systems Manager and/or their supervisor.

REFERENCES:

Personnel Policies and Procedures Manual; Policy 6.03, Harassment 
Policy; Policy 6.06, Conflict of Interest; Policy 6.21, Correction 
Action and Discipline; Policy 6.24, Employee Responsibility.
122.10Harmony, Wisdom, FreedomSTOWMA::ARDINIFrom the third plane.Thu May 15 1986 13:247
    	I am visualizing, feeling, and believing that we all with have
    free R/W access to this file for years to come.  I wish harmony
    and prosperity to all the individuals who control this file's life. 
    
    							Jorge'
    
    PS.  Thanks for the flag steve!
122.11Just read this in HUMAN::DIGITALHUDSON::STANLEYASTRAl projectionistThu May 15 1986 17:0616
        RE: 111.160 (I haven't read all intervening notes)
        
        [HUMANs: sorry for the time.]
        
        I've talked directly to the person responsible for both the DIS
        and personnel policies. It still isn't time to panic. The
        *intent* of the policy is quite reasonable and "engineering".
        Very few of the 120 "Personal" files that exist today are
        intended to be banned by the policy. I have suggested that
        the current wording is unfortunately prone to misunderstanding.
        
        More later (after work hours).
        
        JimB. 
    
122.12A little more info...HUDSON::STANLEYASTRAl projectionistThu May 22 1986 14:5467
               <<< HUMAN::ARKD$:[NOTES$LIBRARY]DIGITAL.NOTE;1 >>>
                          -< The DEC way of working >-
================================================================================
Note 111.189                Notes files under fire?                   189 of 189
RAVEN1::HEFFELFINGER "Tracey Heffelfinger"           58 lines  22-MAY-1986 13:04
                           -< Words from the source >-
--------------------------------------------------------------------------------

       Some informationfrom the source...
    
       Since I was concerned about the effect this policy would have
    on my job, (I'm system manager of a general purpose/mail machine
    that by its very nature would make my job constant hell under the
    new policy) I started trying to trace back the policy and let my
    manager see a copy of the policy, told her my concerns about it,
    all the background I knew, and what I was attempting to do (give
    feed back to the author of the policy).
    
       My manager quite agreed that the wording of the policy would
    put us in an untenable position.  (Particularly since the locals
    are inclined to interpret policy in the strictest manner possible
    as has been shown by previous incidents.)  
    
       I'm very glad I said something to her about this on Tuesday.
     As it turns out, their was a supervisors and managers meeting
    Wednesday afternoon and one of the speakers was... ta da... the
    author of this policy.   My manager talked to him this morning and
    got clarification on the policy.  The intent is indeed not to close
    down games or notes or to make every take their resume' off the
    system, etc, ad nauseum.  The policy is geared toward outlawing
    abusive (sexist, rascist, etc) material and clear abuses for personal
    profit.  (Sexcetera was *not* the only factor in this policy.  There
    was evidently an employee who had their own video rental service
    going over the net.  Had over 1000 tapes and was raking in the bucks
    using company resources.)
    
        One of my biggest concerns about the policy is that it seemed
    to require me as system manager to go into other people's accounts
    to monitor usage.  Having had it drummed into me that "person's
    account is as sacred as his desk.  No browsing allowed." I was
    concerned about the implications of this.  (I had visions of being
    turned into the local Gestapo.)  I was told that this policy is
    in part for my protection.  If I have to investigate a suspected abuse,
    (and I must investigate if a suspected abuse is reported to me)
    I don't have to worry about a personal law suit against me by the
    affected persons for invasion of their privacy, since I am *Required*
    by company policy to investigate and report abuse.  (Legal eagles
    feel free to correct that, that's just what I was told.)
    
        The upshot is that the two levels of management above me have
    been informed of the way I wish to ienforce this policy and what
    the policy's author had to say about it (he agreed I was following
    the intent) and I have a name to point to say "he said I'm following
    policy."  So I feel OK about my situation now.  (I's still prefer
    to have the policy say what it means, but I personally don't feel
    threatened now.)
    
         I suggest that if you are concerned, you take it up with your
    manager.  Perhaps, if enough people do this, the policy will be
    reworded.  If not, at least you know where you stand with your bosses.
    
         Oh, BTW, the word we got from this meeting was that the policy
    will be in effect starting JUNE.
    
    tlh
    
    
122.13Plan "A"?INK::KALLISThu May 22 1986 15:0410
    re .12
    
    Then one possible contingency plan is that if the system manager
    of this conference doesn't believe maintaining this file is "within
    policy," we might find a home for it on another "friendliert" system.
    
    A thought to keep in mind...
    
    Steve Kallis, Jr.