fbpx
 +1 386-243-9402 MON – FRI : 09:00 AM – 05:00 PM

Internet Acceptable Use Guidelines for IBM Employees

Version 1.0

IBM Corporation

Document Number: INETGUID
(Draft Date) January 29, 1996

IBM Internet Coordination Council
N. Trio, Chairman
Watson Research Center
[email][email protected][/email], NRT at WATSON

Table of Contents

Introduction

General Principles

Introduction

The Internet is a rapidly growing and important resource for IBM employees, and can provide a competitive advantage to us in the form of information gathering, improved external communications, and increased customer responsiveness. However, as we use the Internet to connect with our customers, suppliers and other organizations, it is important to remember the following points:

As more and more of our employees use the Internet to connect with our customers, suppliers and other key organizations, it is important we all understand appropriate “netiquette”. As we use the Internet, we must also keep in mind that IBM’s information and computing assets are critical to our company’s success, and as a result, must be protected from loss, modification or destruction.

We want our employees to use the Internet to get connected to people and vital sources of information around the world. This guideline document is meant to provide useful tips and techniques to promote effective and secure Internet communications.

Document Control and Availability: This document will be reviewed annually, and will be re-issued when revisions are necessary. Obsolete copies should be destroyed as soon as practical, and shall be the responsibility of the holder.

Softcopy of this document is available from the IBM internal World Wide Web (WWW) server (http://w3.ibm.com/iug.html).

General Principles

IBM’s visibility on the Internet is rapidly increasing both inside and outside our company. Not all the do’s and don’ts can be put down on paper–your best guide to appropriate work-related uses of the Internet are both the IBM Business Conduct Guidelines and common sense. Your good judgment can guide you to appropriate uses of the Internet and will help enhance the image of IBM.

Your first obligation is to protect IBM information assets. Generally, all servers being put on the Internet for access by non-IBMers should be approved by IBM management with appropriate safeguards to protect IBM intellectual property.

Here are the basic principles to follow when accessing the Internet from an “ibm.com”, or other IBM address designation:

Approved Use Of Computer Services

When an employee connects to the Internet using the “ibm.com” or other IBM address designation, it should be for IBM business-related activity. IBM Business Conduct Guidelines state that “IBM equipment, systems, facilities and supplies must be used only for conducting IBM’s business or for purposes authorized by management.” This applies to both internal IBM systems and to IBM’s connections to the Internet.

IBM contractors can use the Internet for IBM business purposes to the extent needed to conduct a stated assignment, with IBM management approval.

Personal use of IBM computing equipment may only be approved by IBM management if such use is clearly insignificant, does not interfere or compete with IBM business, and does not involve any incremental cost to IBM.

Specifically, the Internet should not be used:

Any questions concerning personal use of IBM computing resources, or about use of the Internet, should be discussed with your manager.

Using IBM computer systems to send or reply to “chain letters”, or to distribute or obtain offensive or inappropriate material, is prohibited.

Handling Classified Data

IBM material which is classified IBM Confidential must not be stored or sent on the Internet. Local management can make exceptions for IBM Confidential material when appropriate contracts are in place with the information recipients, and when data encryption is used.

If you receive another company’s classified data from the Internet, you must comply with that company’s requirements for protecting the data. Any questions concerning protection of non-IBM information should be discussed with your manager or your local legal counsel.

Downloading Materials From The Internet

Most information and software that is accessible on the Internet is subject to copyright or other intellectual property right protection. Therefore, nothing should be copied or downloaded from the Internet for use within IBM unless express permission to do so is stated by the material owner.

Materials distributed over the Internet in the form of “shareware” or “freeware”, often come with express requirements or limitations attached (e.g., not to be used for commercial purposes; can not charge others for use or distribution; subject to a copyright or attribution notice being affixed to each copy, must distribute source code, etc.) If there are such terms applied, you must read and understand them before downloading the software, and make a copy of the terms if possible. If you think that IBM will not be able to comply with any part of the terms, do not download the material. Any time you are unsure about the meaning of the restrictive language or have questions about it, you should contact an IBM attorney to review it before downloading or using the material.

IBM employees must seek assistance and approval from IBM General Legal or Intellectual Property Law counsel before incorporating anything downloaded from the Internet (or any external on-line service) into a product or material IBM intends to distribute externally.

When downloading software, as a courtesy to others, try to do large file transfers during off hours for the server.

Internet Service Facilities

Electronic Mail

Electronic mail is the most commonly used facility on the Internet. When communicating outside IBM, remember:

Telnet

Trying to remotely access a system you are not authorized to use is called “fishing.” Unless you have prior authorization, do not try to get into open ports, or try to access servers you have no authorization to get into.

Usenet

Usenet is a conferencing system similar to IBM forums. Usenet exchanges tend to be more open, more candid, and more adversarial at times.

If you are new to Usenet, subscribe to “news.announce.newusers,” which provides information on “netiquette” (etiquette on the Internet).

Usenet is for the most part a pretty friendly place. However, if you are on Usenet and find yourself being “attacked,” be thoughtful about how you respond. Remember, you’re responding from an IBM address even though you may be expressing your own opinion . In many cases, the best thing is to limit your replies to the facts, or withdraw from the conversation altogether.

Here are some other guidelines for IBM participation in Usenet: