1.0 BASIC POLICY
1.1 As an advanced technology company, we increasingly use and exploit electronic forms of communication and information exchange. Employees have access to one or more forms of electronic media and services (computers, e-mail, telephones, voice-mail, fax machines, external electronic bulletin boards, wire services, on-line services, the Internet and the World Wide Web).
1.2 The company encourages the use of these media and associated services because information technology is our business, because they make communication more efficient and effective, and because they are valuable sources of information, e.g., about vendors, customers, new products and services. However, electronic media and services provided by the company are company property, and their purpose is to facilitate company business.
1.3 With the rapidly changing nature of electronic media, and the "netiquette" which is developing among users of external on-line services and the Internet, this policy cannot lay down rules to cover every possible situation. Instead, it expresses the company's philosophy and sets forth general principles to be applied to use of electronic media and services.
1.4 The following procedures apply to all electronic media and services which are:
- accessed on or from company premises,
- accessed using company computer equipment, or via company-paid access methods, and/or
- used in a manner which identifies the individual with the company.
2.1 Electronic media may not be used for knowingly transmitting, retrieving or storage of any communications of a discriminatory or harassing nature, or which are derogatory to any individual or group, or which are obscene or X-rated communications, or are of a defamatory or threatening nature, or for "chain letters," or for any other purpose which is illegal or against company policy or contrary to the company's interest.
2.2 Electronic media and services are primarily for company business use. Limited, occasional or incidental use of electronic media (sending or receiving) for personal, non-business purposes is understandable and acceptable -- as is the case with personal phone calls. However, employees need to demonstrate a sense of responsibility and may not abuse the privilege.
2.3 Electronic information created and/or communicated by an employee using e-mail, word processing, utility programs, spreadsheets, voice-mail, telephones, Internet/BBS access, etc. will not generally be monitored by the company, and we respect our employees' wish to work without "Big Brother" looking over their shoulder. However, the following conditions should be noted:
2.3.1 The company routinely monitors usage patterns for both voice and data communications (e.g., number called or site accessed; call length; times of day calls). Reasons include cost analysis/allocation and the management of our gateway to the Internet.
2.3.2 The company also reserves the right, in its discretion, to review any employee's electronic files and messages and usage to the extent necessary to ensure that electronic media and services are being used in compliance with the law and with this and other company policies.
2.3.3 Employees should therefore not assume electronic communications are totally private and confidential and should transmit highly sensitive information in other ways.
2.4 Employees must respect the confidentiality of other people's electronic communications and may not attempt to read, "hack" into other systems or other people's logins, or "crack" passwords, or breach computer or network security measures, or monitor electronic files or communications of other employees or third parties except by explicit direction of company management per section 2.3.
2.5 Each employee who uses any security measures on a company-supplied PC or MAC must provide his/her group administrative assistant with a sealed hard copy record (to be retained in a secure location) of all of his/her PC or MAC passwords and encryption keys (if any) for company use if required. (Example: there may be a need for the company to access an employee's system or files when s/he is away from the office). There is no need to provide UNIX passwords since the UNIX system administrator can access all e-mail and files via "root" passwords if necessary.
2.6 No e-mail or other electronic communications may be sent which attempt to hide the identify of the sender, or represent the sender as someone else or from another company.
2.7 Electronic media and services should not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system.
2.8 Anyone obtaining electronic access to other companies' or individuals' materials must respect all copyrights and may not copy, retrieve, modify or forward copyrighted materials except as permitted by the copyright owner or a single copy for reference use only.
2.9 Any messages or information sent by an employee to one or more individuals via an electronic network (e.g., bulletin board, on-line service, or Internet) are statements identifiable and attributable to our company. While some users include personal "disclaimers" in electronic messages, it should be noted that there would still be a connection with the company, and the statement might still be legally imputed to the company. All communications sent by employees via a network must comply with this and other company policies, and may not disclose any confidential or proprietary company information.
2.10 Network services and World Wide Web sites can and do monitor access and usage and can identify at least which company -- and often which specific individual -- is accessing their services. Thus accessing a particular bulletin board or Website leaves company-identifiable electronic "tracks" even if the employee merely reviews or downloads the material and does not post any message.
2.6 The company makes available to employees a service for posting internal personal announcements to other company employees. All such internal electronic personal announcements must go through this Human Resources service.
2.7 Any employee found to be abusing the privilege of company-facilitated access to electronic media or services will be subject to corrective action and/or risk having the privilege removed for him/herself and possibly other employees.