[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference hydra::dejavu

Title:Psychic Phenomena
Notice:Please read note 1.0-1.* before writing
Moderator:JARETH::PAINTER
Created:Wed Jan 22 1986
Last Modified:Tue May 27 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:2143
Total number of notes:41773

234.0. "New personnel policy" by USHS01::MCALLISTER (TARDIS Sales and Service Co.) Mon Nov 03 1986 22:15

    In light of statement 1095.0 in EASYNET_CONFERENCES, whats the next
    step for DEJAVU?
    
    Concerned,
    Dave
    
    "What's the use of a good quote, if you casn't adapt it to your
    own purposes"
T.RTitleUserPersonal
Name
DateLines
234.1Recursion?INK::KALLISSupport Hallowe'enTue Nov 04 1986 08:254
    Is this different than the "Ill omen" concern?
    
    Steve Kallis, Jr.
     
234.2from policies peopleUSHS01::MCALLISTERTARDIS Sales and Service Co.Tue Nov 04 1986 08:5285
I dislike copying from one file to another, but this is probably worth
    it.  See line in DEFINITION section containing " communicating
matters of private conviction or philosophy ".
    
    Dave
    
    68 + lines follow
    
    
    
                 <<< TLE::PUBD$:[VAXNOTES]EASYNET_CONFERENCES.NOTE;2 >>>
                       -< EasyNet Conference Directory >-
================================================================================
Note 1095.0        Approved Policy:  Proper Use of Computers          No replies
COVERT::COVERT "John Covert"                         68 lines   3-NOV-1986 21:54
--------------------------------------------------------------------------------


		PERSONNEL Policies and Procedures	Section 6.54
							Date 17 Nov 86

 
PROPER USE OF DIGITAL COMPUTERS, SYSTEMS AND NETWORKS 
 
POLICY
 
Digital owns and operates computers, systems and networks in support
of Company business activities.  Systems should be used to enhance the
cost effectiveness and efficient running of the business, to assist
employees in being more effective in executing their duties and
responsibilities, to foster appropriate open and efficient
communications and to perpetuate the use of computers in day to day
activities.  The efficient operation of these vital resources is
critical to the success of the business.  Therefore, it is the
responsibility of all employees to insure that these resources are
being used properly. 
 
DEFINITION
 
For purposes of this policy, improper use includes, but is not limited
to, the use of Digital owned and/or operated computer systems and
networks for the purpose of gaining unauthorized access to internal or
external computer systems or accounts, for personal purposes that are
contrary to Company philosophy or policy, for purposes that interfere
with the Company's business activities, or for purposes of individual
financial gain.  Examples of misuse could be transmitting offensive,
harassing and/or devaluing statements, developing and transmitting
inappropriate graphics, transmitting sexual or ethnic slurs or jokes,
soliciting other employees, developing chain letters, communicating
matters of private conviction or philosophy, permitting unauthorized
access, etc. 
 
RESPONSIBILITIES
 
INFORMATION SYSTEM MANAGERS:  Information Systems Managers must ensure
that computers, systems and networks that they manage are clearly
operating in support of Company business activities.  This could be
accomplished by reviewing equipment usage and educating users, issuing
periodic systems management advisories.  Information Systems Managers
will also immediately investigate and report any incident of misuse by
an employee to the employee's manager. 
 
MANAGERS:  Managers should periodically remind employees about the
proper use of Company computer resources and with proper consideration
of employee privacy, monitor these resources to insure that they are
being used in accordance with this policy. Additionally, in cases
where there is suspicion of improper use, managers should discuss the
problem with the employee in question, and, if appropriate, involve
Security.  In cases where improper use has been clearly established,
the employee should be dealt with in accordance with the Corrective
Action and Disciplinary Policy (6.21). 
 
EMPLOYEES:  Employees are expected to use Company sponsored computer
resources in accordance with this policy and to support company
business activities.  In addition, employees should report all
potential misuse to the appropriate Information Systems Manager and/or
their supervisor. 
 
REFERENCES
 
Personnel Policies and Procedures Manual; Policy 6.03, Harassment 
Policy; Policy 6.06, Conflict of Interest Policy; 6.21, Corrective 
Action and Discipline; Policy 6.24, Employee Responsibility; Policy 
6.18, Employee Privacy.

234.3We're still ok I think.PBSVAX::COOPERTopher CooperTue Nov 04 1986 11:2628
    I don't think we really have a problem, though some clarification
    may be in order.  I think that what that is supposed to refer to
    is use of electronic mail for political or religious proselytizing.
    
    Notice the statement is in the section refering to what *could*
    be misuse -- its still subject to judgement.  If I got a mass mailing
    over the network exhorting me to become a <<pick your least favorite
    proselytizing religion>> then I would be annoyed and would legitimately
    feel that company resources were being used inappropriately.
    
    A voluntary forum -- explicitly open to all (almost all) views --
    is unlikely to be viewed as misuse.  Of course this is subject to
    limitations -- statements which are clearly libelous or which involve
    racial, religious, sexual or ethnic slurs are out of bounds, for
    example, AND ALWAYS HAVE BEEN.
    
    Note that if the phrase in question is interpreted broadly at all,
    I would be unable to express my personal opinion via mail even on
    technical issues which I am competent in and which are relevant
    to company business.
    
    I do think that this phrase, along with a few others, needs to be
    clarified to prevent some *** from using an overly strict
    interpretation as a form of safe persecution against someone they
    "have it in for".  I am pretty sure, however, that the intention
    is innocuous.
    
    				Topher
234.5Let's HopeINK::KALLISSupport Hallowe&#039;enTue Nov 04 1986 17:146
    In one of the other files, a moderator stated that in his opinion
    the file met the criteria as spelled out in the Policy, so he was
    letting it stay.  Good for him!
    
    Steve Kallis, Jr.