STANDARD OF ONLINE CONDUCT
When utilizing social media for business-related purposes, follow all applicable MaineHealth Member Code of Conduct policies. Below is a list of guidelines you must adhere to prior to participating in online forums:
- Always show proper care to safeguard patients' privacy and confidentiality.
- Never engage in any conduct that would not be acceptable in your workplace.
- When identifying yourself as an employee, ensure your profile and related content is consistent with institutional codes of conduct, privacy and confidentiality policies.
- Always follow all institutional conduct, confidentiality and privacy policies and rules.
- Employees are personally responsible for the content they publish on institutional electronic communication resources and on blogs, wikis or any other form of user-generated media. Any content that is published should be considered public and permanent.
- Never use institutional electronic communication resources at any time including incidental personal use for stating personal or political views, communicating inappropriate, sexually explicit, racial, ethnic or offensive statements, or soliciting employees regarding products, services or organizations.
- Never use profanity, derogatory epithets or sexual, threatening or abusive language when communicating using institutional electronic communication resources.
- Never forward electronic communications that you receive which are in violation of institutional electronic communications policies and standards to others, except to notify your supervisor or the Human Resources Department regarding the inappropriate or offensive communication.
- Always be mindful of physical safety when posting information about yourself or others on any social networking site, personal website or the Internet.
- Never engage in any unlawful activities or any other activities that would in any way bring discredit to your employer.
- Never engage in personal commercial activities using institutional electronic communication resources, including solicitation or offering services or merchandise for sale or ordering services or merchandise from on-line vendors, or for any non-job related solicitations including incidental person use.
- Never use any institutional system as part of a public network without the express approval of the individual's department director or chief. This includes any file-sharing network, social instant messaging network or distributed computing resource network.
- Never establish personal accounts with independent Internet or e-mail service providers that attempt to represent your employer.
- Never communicate confidential information via public instant messaging sessions such as Google Chat, Yahoo, and MSN.
- Always follow all copyright, fair use and financial disclosure laws. Protect your employer's and other's intellectual property.
- Always try to add value by providing worthwhile information and perspective. What employees publish may reflect on their employer and its mission.
- Always identify yourself using your name and when appropriate your role at your institution when you are discussing institutional-related matters.
- Always write in the first person and make it clear that you are speaking for yourself and not on behalf of your employer.
- Never provide your institution's or another's confidential or other proprietary information including information from conversations that were meant to be private or internal.
- Never cite a reference to or use photos of patients, business partners, suppliers on external sites without prior written authorization from your institution's Communications and Marketing Department, and where appropriate the individual or organization. Where appropriate, references should be a link to the original source
- Never engage in any activity that would compromise the security or stability of any institutional host computer or the network. If there is a question as to whether or not any specific activity would result in a compromise, users should contact their manager, supervisor or Information Services before proceeding.
- Never obtain or attempt to obtain otherwise unauthorized access to any computer system or conduct vulnerability testing or scanning of any system, application or data storage devices without the permission of the your institution's Technical Compliance Manager.