Subject: Newsroom Internet Policies From: LeeRozen@seattle-pi.com (Lee Rozen) Date: Mon, 17 Apr 1995 12:38:44 -0800
How the Web Was Won
Subject: Newsroom Internet Policies
From: LeeRozen@seattle-pi.com (Lee Rozen)
Date: Mon, 17 Apr 1995 12:38:44 -0800
X-Mailer:
Sender: owner-online-newspapers@marketplace.com
Precedence: bulk
Reply-To: online-newspapers@marketplace.com
Status: RO
X-Status:
BEWARE: A very long e-mail follows.
Here are the policies about Internet and computer use that the Seattle
Post-Intelligencer developed prior to loosing our reporters and editors onto
the net over our new T1 connection.
A committee of three editors, the news librarian and three systems
administrators developed the policies over a month from existing ones and
from the information provided by members of the online-newspapers list among
others. We expect to photocopy the four pages here to form a booklet from a
folded 11x17 sheet of paper. Each new user will get one-on-one training from
the news editor/systems, as well as getting the written policies. Since we
are just gearing up for this, modifications are still very possible. Let me
know if something in here bothers you.
Here, then, is the policy:
___________________________________________________________________
SEATTLE POST-INTELLIGENCER
Computer Use Policies
Internet Conduct, Administration, Software and Security
These three policy guidelines are intended to help you with a new and
useful tool, which can sometimes be confusing. If you run into a conflict,
contact the System Administrator for help.
Internet Conduct
----------------
USE OF THE INTERNET
Your company-provided connection to the Internet and other electronically
accessed data bases can assist you in your work as a journalist. Obviously,
it is not for games or entertainment. You may use the connection for
personal correspondence, provided that you still follow these and all other
rules of behavior that apply while working as an employee of the company.
NETIQUETTE
Observe the policies of the paper when on the Net, including those against
sexual harassment or discrimination on the basis of race, origin, sex, age,
disability or sexual preference. Do not enter, bring to the screen or
download material that could embarrass you or the P-I.
On the Net, behave and _speak_ as you would at a public meeting while
representing the newspaper. Treat online interactions courteously and
professionally, as you would any other contact with the public. At times,
even more courtesy is needed than in a phone call because _voice
inflections_ are not so easily recognized on the screen. Let flaming be a
one-way street. If somebody flames you, do not respond with another personal
attack.
If you post a general request for information on a forum or newsgroup, good
conduct suggests you share the results of your search with those who helped.
This will avoid creating a bad reputation for you and the paper as _takers_
but never _givers._
It is your responsibility to check your Internet e-mail box regularly and
to respond as appropriate. Unanswered e-mail from readers reflects poorly on
you and the newspaper.
You will be given a copy of a Netiquette Guide when you are trained and
select your password. Follow the guide in all your Internet transactions.
OPINION AND LIBEL
Edit what you write carefully. Observe all the rules and limitations on
language or use of opinion that would apply to writing for the paper. As you
use the Internet, assume the laws of libel and defamation will apply. Be as
cautious with what you post or transmit as you would with a newspaper story.
YOUR SIGNATURE
The computer puts a signature at the end of each piece of e-mail
identifying you and your P-I affiliation. Do not express personal opinions
that would compromise you as a journalist. If opinion is needed, make clear
that, in this instance, you do not speak for the P-I. A sample signature:
Robert L. Reporter Jr. Staff Reporter
Seattle Post-Intelligencer, 101 Elliott Ave. W.
P.O. Box 1909 Seattle, WA USA 98111-1909
Phone: 206-448-8000 Fax: 206-448-8166
E-mail: RobertLReporterJr@seattle-pi.com
VERIFYING INFORMATION
People at the other end of the e-mail may not be who they say they are.
Extreme caution is necessary to verify what you receive from the Net. Never
take information directly off the Net without ensuring that the apparent
author, in fact, wrote or said it. If quoting from material posted on the
Net, contact the person quoted off line before publishing the material.
Sometimes people posting on the Net do not realize their words could be
used in a widely distributed newspaper. But no one can claim words they
posted or used in e-mail, a forum, listserver, newsgroup or chat room are
off the record.
COPYRIGHT
Because we copyright the entire newspaper, we cannot post copies of our
stories. Reporters may share these with individual sources for professional
reasons, but not for republication.
DOWNLOADING FILES
Download only e-mail and text files. Avoid downloading files of art work
and illustrations unless they are needed for immediate publication. They
clog our Internet connection while downloading and consume huge amounts of
disk space. Never download programs (files with .EXE, .INI, .COM or .BAT
extensions, among others) or games. These can contain viruses. Get specific
permission and help from the System Administrator if you believe you must
download a program.
TERMINAL ETIQUETTE
Initially, we will have a limited number of terminals to reach the Net. A
person needing one of these terminals for a deadline story should have
priority over someone browsing for a lower priority use. This will be a
matter of courtesy, not policing.
PASSWORD PRIVACY
Your password is your own, never to be shared, loaned or disclosed. This
is true of your logon as well. Do not log on, and then let someone else use
your Internet connection. Do not stick your password onto your terminal or
record it where others can use it to log on as you.
A COMPANY RESOURCE
The Internet connection provided you is a company resource. While we may
use terms such as _your_ queue, or _your_ file, these remain company
property and can be examined if necessary.
Administration
--------------
LOGONS
Employees with accounts on P-I computers or the Internet will be assigned a
unique logon or Internet mail address. The P-I convention is designed to
make it easy for others to send you mail.
For the Internet mail address, the P-I convention is:
FirstnameLastname@seattle-pi.com.
As in this example: Sid E. Editor becomes SidEditor@seattle-pi.com.
If your name appears in the newspaper, your mail address for the Internet
is: YourByline@seattle-pi.com.
As in this example: Bob Reporter becomes RobertLReporterJr@seattle-pi.com.
The logon convention for P-I computer accounts requires the first letter of
the first name and five letters from the last name, i.e., John Smith becomes
JSMITH. Exceptions may be made by the System Administrator to avoid
duplication.
PASSWORDS
A password is an important security measure to keep unauthorized people
from using your account. Such an intrusion could not only be embarrassing to
you, but also could put P-I computers and production of the newspaper in
serious jeopardy. Do not share your password with anyone.
All passwords will be made up of both letters and numbers and include at
least six characters Although the P-I would prefer that you do not write
down your password, this may be necessary to remember it. If you must write
down your password, do not write it where your identification is apparent or
display it anywhere within your work area.
Because passwords can be found out, personal passwords will be changed
every six months. You will be reminded to do this.
You should always log off your computer when your station is left unattended.
DISK STORAGE
Because the amount of storage on any computer system is limited, it is
essential to have a system to administer storage space. All users will be
assigned an amount of disk space appropriate to their job. The procedure for
monitoring disk usage will vary from system to system and will be
administered by the System Administrator.
Software and Security
---------------------
The P-I's computers are critical to your ability to do your job. Certain
technologies, procedures and policies must be put into place to protect the
computers. Regrettably, sometimes convenience will be sacrificed to ensure
security and reliability.
The System Administrator will ensure we have proper and adequate security
measures.
Several technologies allow P-I computers to interact with outside
computers. The P-I is already using some of these and will use more in the
future. For each, the System Administrator must install appropriate and
effective security measures.
To avoid viruses, only the System Administrator may install new programs.
To protect the P-I's computers from virus programs, certain precautions
must be taken. The methods for dealing with this problem will change as the
methods for spreading viruses change.
Because of the potential for disaster if a virus did infect our network, it
is necessary to restrict the types of files that can be routinely copied
into the network.
You must never download games or programs (files with .EXE, .INI, .COM or
.BAT extensions, among others), because these can contain viruses. Viruses
easily could cripple our ability to publish the newspaper. Download only
e-mail and text files. If you feel you need to download a program, get
specific clearance and assistance from the System Administrator in advance.
For example, if you acquire database records from a government agency, they
may provide a utility program that is required to examine the records. The
utility program might contain a virus. The System Administrator will check
it thoroughly for viruses before installing it.
Not everyone who uses a P-I computer has the experience to easily
differentiate between a program and a text file. When in doubt, immediately
ask the System Administrator for assistance.
Compressed files may contain files susceptible to viruses.
To transmit information over the Internet, a package of files and programs
is often compressed into a single file. Your Internet training will help you
identify common compression programs for DOS PCs and Macintoshes. Whatever
the method, try to find out what kinds of files are in the package before
decompressing them. If there are program files, get the permission and help
of the System Administrator.
If you notice program files only after the package is decompressed, DO NOT
EXECUTE THE FILE. As long as you do not execute a file, it should not infect
the computer. DO NOT TRY TO RUN OR USE THE PROGRAM. Seek the assistance of
the System Administrator, who will make sure the file is virus free before
allowing it to be run on any computer on the P-I network.
To avoid copyright violations, do not install software on P-I computers.
To ensure that copyrights are observed, reduce software conflicts, avoid
viruses and maintain network reliability, the System Administrator must
register and install all new software. Only the System Administrator may
make exceptions to this rule. Copyright law covers most software, whether
purchased retail or downloaded over a modem. The copyright restrictions
vary drastically between programs. The System Administrator will work to
avoid potential problems.
Do not copy software from a P-I computer.
Under no condition will any P-I employee copy software from a P-I computer.
This protects you and the P-I from copyright violations and damage from
incompatible software.
Only the System Administrator may enable a computer to receive calls.
Many P-I computers have modems connected to them. In most cases, the modems
enable the user to connect to outside sources, and do not allow outside
sources to dial into the computer. It is risky to configure a modem and its
software to answer calls. No computer may be configured in this way without
permission and assistance from the System Administrator.
======================================================
Lee Rozen, AME & Assistant to the Publisher, New Media
Seattle Post-Intelligencer, 101 Elliott Ave. W.
P.O. Box 1909, Seattle WA 98111-1909
Fone: 206.448.8307 E-mail: LeeRozen@seattle-pi.com
URL: under construction
======================================================
From rballard@cnj.digex.net Tue Sep 27 15:05:25 1994
Status: RO
X-Status: A
Received: from anon.penet.fi by cnj.digex.net with SMTP id AA04195
(5.67b8/IDA-1.5 for ); Tue, 27 Sep 1994 15:05:22 -0400
Received: by anon.penet.fi (5.67/1.35)
id AA20985; Tue, 27 Sep 94 19:02:02 +0200
Message-Id: <9409271702.AA20985@anon.penet.fi>
To: rballard@cnj.digex.net