MMN Policies and Procedures
Justice, Equity, and Inclusion Policy
At the Modern Money Network, a diverse, inclusive, and equitable organization is one where all employees and volunteers, whatever their gender, race, ethnicity, national origin, age, sexual orientation or identity, education or disability, feels valued and respected. We are committed to a nondiscriminatory approach and provide equal opportunity for employment and advancement in all of our departments, programs, and worksites. We respect and value diverse life experiences and heritages and ensure that all voices are valued and heard.
This Equity Policy is applicable – but not limited to – outreach and recruitment; interaction within chapters; interaction between chapters and leadership; interaction between chapters and the Board; interaction between leadership and the Board; institutional hierarchies; interpersonal interaction; external communications and social media; training and other materials.
We are committed to being an organization where white supremacy, patriarchy, colonialism, transphobia, islamophobia, ableism, fatphobia, homophobia, classism, and any other system of oppression are actively dismantled.
We understand that:
- These systems of oppression exist both with the organizations/companies/individuals that we interact with outside of the organization, and also exist within each of us.
- If we do nothing, these systems of oppression will maintain their power and their influence.
- We must build an organization that reflects the future that we are trying to build.
- These systems of oppression can be institutionalized in the structures and formal hierarchies that are created at the Board level and at the leadership level.
- The values of perfectionism, constant urgency, either/or thinking, quantity over quality, one correct answer, individualism, objectivity, and right to comfort are part of centuries-long cultures of oppression that ensure those with institutional power maintain that power.
- The traditional images of ‘leaders’ are inherently individualistic, and oppressive, and that alternative leadership ideas and structures are necessary to redistribute power.
Therefore:
- Actively identifying, challenging, and dismantling these systems of oppression at all levels of leadership is a constant and evolving process.
- Our efforts towards diversity, inclusion, and equity are of core importance to our strategy.
- We commit time and resources to diversity, inclusion, and equity work at all levels of leadership.
- We advocate for public policy, economic research, sociological or anthropological analysis, that takes these systems of oppression into account and actively works to dismantle them.
Any member of the Modern Money Network found to have exhibited any inappropriate conduct/behavior, or has broken any of the aforementioned Equity Policy, may be subject to disciplinary action or removal from the network.
MMN Members who believe they have been subjected to any kind of discrimination that conflicts with the Equity Policy, should communicate this to leadership or the Board.
Feedback Policy
We recognize that the programs, policies, and activities of the Modern Money Network will need to evolve over time. The feedback, ideas, and input needed to evolve these systems will come from all directions, including, but not limited to; from outside the Modern Money Network from partners, students, social media followers; from chapter membership; from chapter leadership; from Modern Money Network leadership; from the Board. Feedback or input from these sources will be listened to, and action will be taken if necessary. We recognize that feedback is often difficult to give and therefore any opportunity to receive feedback is a gift and should be a priority.
- The Modern Money Network leadership and the Board will listen to and accept written or verbal feedback with the intention of changing programs, policies, or activities that are harming our members, or our community.
- The Modern Money Network leadership and the Board will enable feedback to be given in the manner that is most comfortable for the person giving the feedback. This includes, but is not limited to; one on one conversation, publicly, anonymous, with a small group of their choosing, with a mediator.
- Feedback will not be punished through financial, emotional, or reputational means.
Information Technology Policy
Policy purpose
- To provide the Modern Money Network (“MMN”) with accessible and professional computing facilities and establish appropriate terms, conditions, and restrictions on the use of said facilities.
- To protect the integrity, security, and confidentiality of data and/or information stored on MMN computing systems.
Appropriate use of information technology resources at the MMN includes (but is not limited to) instruction, independent study, authorized research, and independent research.
Policy scope
- This policy applies to all persons onboarded into MMN systems including email, Element, and Google Drive [see Available Digital Services below]. This includes MMN leadership, and all persons in MMN learning communities.
- This appropriate use policy covers all IT assets of the MMN. “Computing assets” includes but is not limited to all networks, email threads, email addresses, communication in any digital systems [see Available Digital Services below], and physical computing assets provided by MMN. By using any MMN computing facility or service or any other MMN computing asset, the user agrees to all the following policies outlined in this policy.
Enforcement
- Access to networks, systems, data, and information is a privilege granted to Users to be a member of MMN. Misuse of this access could result in the loss of this privilege.
- User violations of any part of this policy may result in disciplinary action up to and including dismissal and temporary or permanent exclusion from MMN activities, MMN systems, MMN affiliation, and MMN membership.
- By using MMN systems, users signify understanding and acceptance of the policies outlined therein.
- MMN membership is contingent upon reading, reviewing, and accepting protocols
MMN Digital Systems Guidelines
- Whenever possible, use open-source applications, websites, digital services, and products.
- For communication, use the following services when possible:
- Element- Use Element for as much communication as possible. This is an open-source service. Element is not to be used for any communication of personal business.
- Email- For all communication with non MMN members who are not yet in Element, use Email. Email is not to be used for any communication of personal business.
- For storing documents, use the following whenever possible:
- NextCloud – Use the institutional NextCloud to store all MMN related materials. This service is not to be used for any materials that are not MMN related.
Security
Users who maintain or access MMN data or information contained in electronic form commit to the following:
- Users are responsible for logging out of all systems and accounts when they are not being used.
- Users must use extreme caution when opening email attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan Horse codes.
- Exercise due and diligent care to protect data and information from unauthorized access, use, disclosure, alteration, or destruction.
- Users are responsible for the security of their passwords and accounts and must keep passwords confidential and are not permitted to share accounts.
- Use only as required for the purpose of MMN activities.
Ownership
Users (Creators) who create data and content (work) in MMN systems agree to license, under the Creative Commons Attribution 4.0 International Public License, their work to:
- MMN, without further condition, and
- all other individual Users of MMN systems, under the condition that the other Users provide the Creator(s) 14 days notice, to which the Creator(s) may elect to add additional days up to 28, so that the work in question will be embargoed and postponed from reuse for either:
- 14 days if the Creator is unresponsive, or
- between 0 and 28 days if the Creator responds with a preferred waiting period
Example scenario 1:
On Jan 1, Alice asks Bob: “May I read your entire post on my podcast? We are planning to record later today.” On Jan 2, Bob replies: “Absolutely. I can’t wait to listen to it.” Alice can publish as soon as Jan 2.
Example scenario 2:
On Jan 1, Alice asks Bob: “May I read your entire post on my podcast? We are planning to record later today.” On Jan 2, Bob replies: “No, sorry, I will never be okay with you publishing that post.” Alice can publish as soon as Jan 29. She might choose not to in order to stay on Bob’s good side, but she’d be within MMN policy.
Example scenario 3:
On Jan 1, Alice asks Bob: “May I read your entire post on my podcast? We are planning to record later today.” On Jan 2, Bob replies: “Hmmm, so the thing is, most of this is headed for my Jacobin piece dropping on Jan 7. Would you please hold off until Jan 9?” Alice can publish as soon as Jan 9.
Internally, within MMN systems (e.g., between learning communities), reusing content (with attribution!) is unrestricted, although we encourage providing 2 days of courtesy notice.
Users may be monitored or audited at any time to ensure compliance with the IT Policy.
Prohibited Use
Although not exhaustive, the following list emphasizes activities that are NOT allowed on MMN networks or systems. Under no circumstances is an User permitted to engage in any activity that is illegal under local, state, federal or international law while utilizing the MMN systems. The following are strictly prohibited:
- Conduct or behavior that is prohibited by MMN policies including harassment or hate crimes as defined in these policies and state and federal laws and regulations.
- Entering into binding commercial relationships on behalf of the network that was not expressly approved in writing in advance
- Accessing or distributing any type of illegal pornography.
- Probing, scanning, or testing the vulnerability of any of our technical systems or networks unless all the following conditions are met: (1) such actions do not unduly abuse or disrupt our technical systems or networks; (2) such actions are not for personal gain (except for credit for your work); (3) you report any vulnerabilities to Modern Money Network developers (and/or fix it yourself); and (4) you do not undertake such actions with malicious or destructive intent.
- Distributing or making unauthorized use of any data, information stored in the MMN systems.
- Knowingly recording any inaccurate or false data in MMN records.
- Using or having others use MMN IT for personal business.
- Making, distributing, or using unauthorized or illegal copies of licensed and/or copyrighted software, media, or material.
- Knowingly introducing destructive software such as programming loops or “viruses” into the system.
- Attempting to circumvent or subvert any system’s security measures or resource allocations.
- Disrupting service, or intentionally damaging files, hardware, or software belonging to the MMN.
- Violations of the rights of any person or company protected by copyright, trade secret, patent or other Intellectual Property, or similar laws or regulations, including, but not limited to, the installation or distribution of copyrighted or other Software products that are not licensed for use by the MMN.
- Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted Software for which the MMN or the User does not have an active license is strictly prohibited.
- Exporting Software, technical information, Encryption Software or technology, in violation of international or regional export control laws, is illegal. MMN leadership must be consulted prior to export of any material that is in question.
- A User’s revelation of that person’s account password to others or allowing use of a User’s account by others, including family and other household members.
- Making fraudulent offers of products, items, or services originating from any MMN account.
- Causing Security breaches or disruptions of communication on MMN systems. Security breaches include, but are not limited to, accessing data or other communications of which the User is not an intended recipient or logging into an account that the User is not expressly authorized to access. For purposes of this section, “disruption” includes, but is not limited to, Network Sniffing, traffic floods, Packet Spoofing, Denial of Service, etc.
- Circumventing User Authentication or Security of any device, system, or account.
- Interfering with or denying Service to any user other than the individual’s Host (for example, a Denial of Service attack).
- Using any Program/script/command, or sending messages of any kind, with the intent to interfere with other User’s systems via any means locally or remotely.
- Providing information about, or lists of, MMN members outside the organization without express approval by MMN leadership.
Communications Activities
- Sending unsolicited Element or Email messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (Email SPAM).
- Any form of harassment via Email, Element, instant messenger, telephone, whether through language, frequency, or size of messages.
- Unauthorized use, or forging, of Email header information.
- Solicitation of Email for any other Email address, other than that of the User’s own account, with the intent to harass or to collect replies.
- Creating or forwarding Chain email, Phishing, or other scams of any type.
- Use of the organization’s name in any unsolicited communication on behalf of, or to advertise, any service or product without the explicit written permission of the MMN.
- Posting the same or similar non-business-related messages to large numbers of learning communities
Procedure
- Any user who discovers unauthorized access attempts or other improper usage of MMN systems should report the infraction to MMN leadership immediately.
- MMN Leadership is responsible for providing Protocols to MMN members upon joining.
- In cases of doubt, it is the user’s responsibility to inquire with MMN leadership concerning the permissibility of technology use.