Subject: Newsroom Internet Policies From: LeeRozen@seattle-pi.com (Lee Rozen) Date: Mon, 17 Apr 1995 12:38:44 -0800
How the Web Was Won
Subject: Newsroom Internet Policies From: LeeRozen@seattle-pi.com (Lee Rozen) Date: Mon, 17 Apr 1995 12:38:44 -0800
X-Mailer: 
Sender: owner-online-newspapers@marketplace.com
Precedence: bulk
Reply-To: online-newspapers@marketplace.com
Status: RO
X-Status: 

BEWARE: A very long e-mail follows.

Here are the policies about Internet and computer use that the Seattle 
Post-Intelligencer developed prior to loosing our reporters and editors onto 
the net over our new T1 connection.

A committee of three editors, the news librarian and three systems 
administrators developed the policies over a month from existing ones and 
from the information provided by members of the online-newspapers list among 
others. We expect to photocopy the four pages here to form a booklet from a 
folded 11x17 sheet of paper. Each new user will get one-on-one training from 
the news editor/systems, as well as getting the written policies. Since we 
are just gearing up for this, modifications are still very possible. Let me 
know if something in here bothers you.

Here, then, is the policy:
___________________________________________________________________
SEATTLE POST-INTELLIGENCER
Computer Use Policies 

Internet Conduct, Administration, Software and Security

	These three policy guidelines are intended to help you with a new and 
useful tool, which can sometimes be confusing. If you run into a conflict, 
contact the System Administrator for help.

Internet Conduct
----------------
USE OF THE INTERNET
	Your company-provided connection to the Internet and other electronically 
accessed data bases can assist you in your work as a journalist. Obviously, 
it is not for games or entertainment. You may use the connection for 
personal correspondence, provided that you still follow these and all other 
rules of behavior that apply while working as an employee of the company.

NETIQUETTE
	Observe the policies of the paper when on the Net, including those against 
sexual harassment or discrimination on the basis of race, origin, sex, age, 
disability or sexual preference. Do not enter, bring to the screen or 
download material that could embarrass you or the P-I. 

	On the Net, behave and _speak_ as you would at a public meeting while 
representing the newspaper. Treat online interactions courteously and 
professionally, as you would any other contact with the public. At times, 
even more courtesy is needed than in a phone call because _voice 
inflections_ are not so easily recognized on the screen. Let flaming be a 
one-way street. If somebody flames you, do not respond with another personal 
attack. 

	If you post a general request for information on a forum or newsgroup, good 
conduct suggests you share the results of your search with those who helped. 
This will avoid creating a bad reputation for you and the paper as _takers_ 
but never _givers._

	It is your responsibility to check your Internet e-mail box regularly and 
to respond as appropriate. Unanswered e-mail from readers reflects poorly on 
you and the newspaper.

	You will be given a copy of a Netiquette Guide when you are trained and 
select your password. Follow the guide in all your Internet transactions.

OPINION AND LIBEL
	Edit what you write carefully. Observe all the rules and limitations on 
language or use of opinion that would apply to writing for the paper. As you 
use the Internet, assume the laws of libel and defamation will apply. Be as 
cautious with what you post or transmit as you would with a newspaper story.

YOUR SIGNATURE
	The computer puts a signature at the end of each piece of e-mail 
identifying you and your P-I affiliation. Do not express personal opinions 
that would compromise you as a journalist. If opinion is needed, make clear 
that, in this instance, you do not speak for the P-I. A sample signature: 

Robert L. Reporter Jr. 	Staff Reporter
Seattle Post-Intelligencer, 101 Elliott Ave. W.
P.O. Box 1909		Seattle, WA USA 98111-1909
Phone: 206-448-8000 	Fax: 206-448-8166
E-mail: 	RobertLReporterJr@seattle-pi.com

VERIFYING INFORMATION
	People at the other end of the e-mail may not be who they say they are. 
Extreme caution is necessary to verify what you receive from the Net. Never 
take information directly off the Net without ensuring that the apparent 
author, in fact, wrote or said it. If quoting from material posted on the 
Net, contact the person quoted off line before publishing the material.

	 Sometimes people posting on the Net do not realize their words could be 
used in a widely distributed newspaper. But no one can claim words they 
posted or used in e-mail, a forum, listserver, newsgroup or chat room are 
off the record. 

COPYRIGHT
	Because we copyright the entire newspaper, we cannot post copies of our 
stories. Reporters may share these with individual sources for professional 
reasons, but not for republication.

DOWNLOADING FILES
	Download only e-mail and text files. Avoid downloading files of art work 
and illustrations  unless they are needed for immediate publication. They 
clog our Internet connection while downloading and consume huge amounts of 
disk space. Never download programs (files with .EXE, .INI, .COM or .BAT 
extensions, among others) or games. These can contain viruses. Get specific 
permission and help from the System Administrator if you believe you must 
download a program.

TERMINAL ETIQUETTE
	Initially, we will have a limited number of terminals to reach the Net. A 
person needing one of these terminals for a deadline story should have 
priority over someone browsing for a lower priority use. This will be a 
matter of courtesy, not policing.

PASSWORD PRIVACY
	Your password is your own, never to be shared, loaned or disclosed.  This 
is true of your logon as well. Do not log on, and then let someone else use 
your Internet connection. Do not stick your password onto your terminal or 
record it where others can use it to log on as you.

A COMPANY RESOURCE
	The Internet connection provided you is a company resource. While we may 
use terms such as _your_ queue, or _your_ file, these remain company 
property and can be examined if necessary. 

Administration
--------------
LOGONS
	Employees with accounts on P-I computers or the Internet will be assigned a 
unique logon or Internet mail address. The P-I convention is designed to 
make it easy for others to send you mail.
 
	For the Internet mail address, the P-I convention is: 
FirstnameLastname@seattle-pi.com.

	As in this example: Sid E. Editor becomes SidEditor@seattle-pi.com.

	If your name appears in the newspaper, your mail address for the Internet 
is: YourByline@seattle-pi.com.

	As in this example: Bob Reporter becomes RobertLReporterJr@seattle-pi.com. 

	The logon convention for P-I computer accounts requires the first letter of 
the first name and five letters from the last name, i.e., John Smith becomes 
JSMITH. Exceptions may be made by the System Administrator to avoid 
duplication. 

PASSWORDS
	A password is an important security measure to keep unauthorized people 
from using your account. Such an intrusion could not only be embarrassing to 
you,  but also could put P-I computers and production of the newspaper in 
serious jeopardy. Do not share your password with anyone.

	All passwords will be made up of both letters and numbers and include at 
least six characters Although the P-I would prefer that you do not write 
down your password, this may be necessary to remember it. If you must write 
down your password, do not write it where your identification is apparent or 
display it anywhere within your work area. 

	Because passwords can be found out, personal passwords will be changed 
every six months.  You will be reminded to do this.

	You should always log off your computer when your station is left unattended.

DISK STORAGE
	Because the amount of storage on any computer system is limited, it is 
essential to have a system to administer storage space. All users will be 
assigned an amount of disk space appropriate to their job. The procedure for 
monitoring disk usage will vary from system to system and will be 
administered by the System Administrator.


Software and Security
---------------------
	The P-I's computers are critical to your ability to do your job. Certain 
technologies, procedures and policies must be put into place to protect the 
computers.  Regrettably, sometimes convenience will be sacrificed to ensure 
security and reliability.


The System Administrator will ensure we have proper and adequate security 
measures.

	Several technologies allow P-I computers to interact with outside 
computers.  The P-I is already using some of these and will use more in the 
future. For each, the System Administrator must install appropriate and 
effective security measures.


To avoid viruses, only the System Administrator may install new programs.

	To protect the P-I's computers from virus programs, certain precautions 
must be taken.  The methods for dealing with this problem will change as the 
methods for spreading viruses change.  
Because of the potential for disaster if a virus did infect our network, it 
is necessary to restrict the types of files that can be routinely copied  
into the network. 

	You must never download games or programs (files with .EXE, .INI, .COM or 
.BAT extensions, among others), because these can contain viruses. Viruses 
easily could cripple our ability to publish the newspaper. Download only 
e-mail and text  files. If you feel you need to download a program, get 
specific clearance and assistance from the System Administrator in advance. 
For example, if you acquire database records from a government agency, they 
may provide a utility program that is required to examine the records.  The 
utility program might contain a virus. The System Administrator will check 
it thoroughly for viruses before installing it.

	Not everyone who uses a  P-I computer has the experience to easily 
differentiate between a program and a text file. When in doubt, immediately 
ask the System Administrator for assistance.


Compressed files may contain files susceptible to viruses.

	To transmit information over the Internet, a package of files and programs 
is often compressed into a single file. Your Internet training will help you 
identify common compression programs for DOS PCs and Macintoshes. Whatever 
the method, try to find out what kinds of files are in the package before 
decompressing them. If there are program files, get the permission and help 
of the System Administrator. 

	If you notice program files only after the package is decompressed, DO NOT 
EXECUTE THE FILE. As long as you do not execute a file, it should not infect 
the computer. DO NOT TRY TO RUN OR USE THE PROGRAM. Seek the assistance of 
the System Administrator, who will make sure the file is virus free before 
allowing it to be run on any computer on the P-I network.


To avoid copyright violations, do not install software on P-I computers.

	 To ensure that copyrights are observed, reduce software conflicts, avoid 
viruses and  maintain network reliability, the System Administrator must 
register and install all new software. Only the System Administrator may 
make exceptions to this rule. Copyright law covers most software, whether 
purchased retail or downloaded over a modem.  The copyright restrictions 
vary drastically between programs. The System Administrator will work to 
avoid potential problems.


Do not copy software from a P-I computer.

	Under no condition will any P-I employee copy software from a P-I computer. 
This protects you and the P-I from copyright violations and damage from 
incompatible software.


Only the System Administrator may enable a computer to receive calls.

	Many P-I computers have modems connected to them. In most cases, the modems 
enable the user to connect to outside sources, and do not allow outside 
sources to dial into the computer. It is risky to configure a modem and its 
software to answer calls.  No computer may be configured in this way without 
permission and assistance from the System Administrator.


======================================================
Lee Rozen, AME & Assistant to the Publisher, New Media
Seattle Post-Intelligencer, 101 Elliott Ave. W.
P.O. Box 1909, Seattle WA 98111-1909
Fone: 206.448.8307     E-mail: LeeRozen@seattle-pi.com
URL: under construction                               
======================================================


From rballard@cnj.digex.net Tue Sep 27 15:05:25 1994
Status: RO
X-Status: A
Received: from anon.penet.fi by cnj.digex.net with SMTP id AA04195
  (5.67b8/IDA-1.5 for ); Tue, 27 Sep 1994 15:05:22 -0400
Received: by anon.penet.fi (5.67/1.35)
	id AA20985; Tue, 27 Sep 94 19:02:02 +0200
Message-Id: <9409271702.AA20985@anon.penet.fi>
To: rballard@cnj.digex.net