[Search for users]
[Overall Top Noters]
[List of all Conferences]
[Download this site]
Title: | The TV Chatter Notes Conference |
Notice: | Welcome to TV Chatter :-) |
Moderator: | PASTA::PIERCE |
|
Created: | Wed Dec 16 1992 |
Last Modified: | Thu Jun 05 1997 |
Last Successful Update: | Fri Jun 06 1997 |
Number of topics: | 498 |
Total number of notes: | 5416 |
2.0. "Corporate Policy" by SNOC02::SALES_NOTES (PhoneCasey@SNOV20::SALES_NOTES) Wed Mar 10 1993 21:42
<<< SNOC02::DISK$CC121:[SALES_NOTES]TV_CHATTER.NOTE;2 >>>
-< The TV Chatter Notes Conference >-
================================================================================
Note 2.0 Corporate Policy No replies
MILPND::J_TOMAO "PracticeRandomActsOfKindness&Beau" 201 lines 16-DEC-1992 05:05
--------------------------------------------------------------------------------
Corporate Policy re: use of Computers, Systems and Networks
See VTX ORANGEBOOK for complete PP&P
+-----------------------------------------------------+------------------------+
| PERSONNEL | Section 6.54 |
| | Page 1 of 4 |
| POLICIES AND PROCEDURES | Effective 01-DEC-90 |
+-----------------------------------------------------+------------------------+
Proper Use of Digital Computers, Systems and
Networks
SCOPE: WORLDWIDE
PHILOSOPHY
Systems and network utilities are powerful business tools, encouraging
creativity and the exchange of ideas needed to maintain our
competitive edge. These tools allow for instantaneous creation of
"electronic" organizations to focus worldwide resources on urgent
tasks. We want to encourage our people to use these tools in
accordance with Company philosophy and values.
Our peer-to-peer, open computing environment reflects our corporate
culture. We sell this concept to customers, and business and society
are clearly moving towards this way of operating. We believe that
what we sell to our customers will get better if we use it ourselves.
Information, and the ability to freely communicate it are valuable
assets that play a significant role in Digital's success. The
protection and appropriate use of these assets is everyone's
responsibility. We must strike a balance between encouraging open
systems and protecting these assets if they are to continue to support
our success.
POLICY
Digital owns and operates computers, systems and networks primarily to
support the Company's business activities. Systems should be used to
enhance the cost effectiveness and efficient running of the business,
to assist employees in being more effective in executing their duties
and responsibilities, to enhance our employees' ability to operate our
computer systems, to foster appropriate open and efficient
communications and to perpetuate the use of computers in day-to-day
activities.
Employees should remember that computers, systems and networks like
paper files, notebooks etc., are company assets provided to employees
to assist them in performing their work. These tools, and the work
product they contain are Company property and are therefore subject to
Company review and control. The efficient operation of these vital
resources is critical to the success of the business, and it is
Digital Equipment Corporation
+-----------------------------------------------------+------------------------+
| PERSONNEL | Section 6.54 |
| | Page 2 of 4 |
| POLICIES AND PROCEDURES | Effective 01-DEC-90 |
+-----------------------------------------------------+------------------------+
Proper Use of Digital Computers, Systems and
Networks
therefore the responsibility of all employees to use the computer
resources provided to them by the Company appropriately.
DEFINITIONS
For the purpose of this policy, improper use includes, but is not
limited to the use of Digital owned and/or operated systems, networks
and conferences for the purpose of gaining unauthorized access to
internal or external computer systems or accounts, for personal
purposes that are contrary to Company philosophy or policy, for
purposes that interfere or compete with the Company's business
activities, or for purposes of individual financial gain. Examples
of misuse include, but are not limited to, transmitting sexual or
ethnic jokes or slurs, soliciting other employees, developing chain
letters, making defamatory statements, disclosing private facts about
any individual or organization, inappropriate disclosure of Company
Proprietary or Confidential Information, permitting unauthorized
access, etc.
RESPONSIBILITIES
COST CENTER MANAGERS - Cost center managers are responsible for
effective use of the Company's assets, which includes networking
and computers. They may delegate that responsibility to other
individuals, but they are ultimately responsible for making sure
these policies are adhered to.
SYSTEMS MANAGERS - All employees must ensure that computers,
systems and networks that they manage are clearly operating in
support of Company business activities. System Managers must
immediately investigate and report any incident of misuse by an
employee to the employee's manager.
MANAGERS - Managers should periodically remind employees about the
appropriate use of Company computer resources and, monitor these
resources to insure that they are being used in accordance with
this policy.
EMPLOYEES - Employees are expected to use Company sponsored
computer resources and their time at work (as determined by their
Digital Equipment Corporation
+-----------------------------------------------------+------------------------+
| PERSONNEL | Section 6.54 |
| | Page 3 of 4 |
| POLICIES AND PROCEDURES | Effective 01-DEC-90 |
+-----------------------------------------------------+------------------------+
Proper Use of Digital Computers, Systems and
Networks
manager) in accordance with this policy and to support Company
business activities. In addition, employees should report all
potential misuse to their manager.
CONFERENCE MODERATORS - Conference (Notesfile) moderators are
expected to periodically review the contents of the conferences
they moderate to insure that material contained in those files
meet the letter and spirit of this policy. Moderators are expected
to remove any material that does not comply with these standards,
and should report violations of this policy to the appropriate
systems or cost center manager.
NOTES FILES/CONFERENCES
Digital provides systems to its employees to maintain computer
conferences (Notes files) in direct support of Company business (i.e.,
product development, financial analysis, business planning, etc.).
Digital also permits access to these systems to communicate matters of
opinions and common interests.
In all cases a computer conference must have an identified conference
moderator as defined above. Where the conference directly supports
the Company's business, the conference moderator and the responsible
systems manager may elect to restrict access to the conference.
Digital classified information may only be placed in a conference with
restricted access. Conferences created to communicate matters of
opinion and common interests may not be used for solicitations of any
kind, and must be open to all employees.
In addition, these conferences may not be used to promote behavior
which is contrary to the Company's values or policy (i.e., they may
not promote discrimination, disrespect for the individual, violence,
etc.). It is the responsibility of employees who utilize such notes
files to do so in a manner consistent with both the letter and spirit
of this policy and the Company's values. The Company reserves the
right to terminate any notesfile it believes is inappropriate or in
violation of this policy.
Digital Equipment Corporation
+-----------------------------------------------------+------------------------+
| PERSONNEL | Section 6.54 |
| | Page 4 of 4 |
| POLICIES AND PROCEDURES | Effective 01-DEC-90 |
+-----------------------------------------------------+------------------------+
Proper Use of Digital Computers, Systems and
Networks
RESPONSIBILITY FOR CONTENT OF MESSAGES SENT OR POSTED ON NETWORK
Messages mailed or posted over the Digital network are the
responsibility of the original author. Posting these materials in a
notesfile/conference without the explicit permission of the author is
prohibited and is a violation of this policy.
When forwarding messages or posting them to conferences, removal or
falsification of the original message header (which indicates the
author) is prohibited.
| This policy covers all messages addressed to individuals and
| organizations. It is not intended to restrict the distribution of
| general announcements, course listings, etc., or messages originally
| posted on external bulletin boards such as Usenet news groups.
COMPANY ACCESS
Because networks, computer systems and accounts are resources the
Company provides to its employees, the Company reserves the right to
access those networks, systems and accounts as it deems necessary.
POLICY VIOLATIONS
Managers who suspect systems are being used improperly should discuss
the problem with the employee in question and, if appropriate, involve
security. In cases where improper use has been clearly established,
the employee should be dealt with in accordance with the Corrective
Action and Disciplinary Policy (6.21).
REFERENCES
T.R | Title | User | Personal Name | Date | Lines
|
---|