CIO2CIO Editorial Policy

We intend for CIO2CIO to be a lively meeting of the minds, a vibrant discussion of the key challenges that are facing IT today, a forum to share experiences and a light house guiding especially young CIOs through the ongoing journey toward successful and significant endeavors in the 21st century. CIOs and senior IT executives are invited to join CIO2CIO in order to contribute their thoughts, feelings and reflections on this vital and growing part of every business. We hope that you do, and that this interchange proves useful and informative.



If you would like to participate, we ask that you embrace and honor the core values that govern our community: Respect, Transparency, and Authenticity. All decisions regarding the publication of content and comments on this site will be made by the CIO2CIO editorial team with deep consideration toward upholding these values in everything we do. We ask that you give the same consideration to the material you submit.


We strive for CIO2CIO to be known as values-based and self-governing online community, a place for open dialog among people who respect each other. In order to clarify how we currently think about our values, we’d like to list some of the ideas we believe flow from them:

Agree to Disagree

We strive to post high-quality, acceptable content. We take responsibility for our own words and ask other to do so as well. We “agree to disagree” and strive to conduct all discussion in a civil and respectful manner. At all times, we respect each other’s right to speak our minds.


As an edited publication, we reserve the right to restrict or remove comments on our blogs and forums that do not conform to these standards or uphold our values. We believe unacceptable comments include (but are not limited to) any that:

  • are being used to abuse, harass, stalk, or threaten others
  • are libelous or knowingly false
  • infringe upon any copyright, trademark or trade secret of any third party. (We respect the rights of original creators. If you quote or excerpt someone’s content, please provide proper attribution to the original author. For a clear definition of proper attribution
  • violate an obligation of confidentiality
  • violate the privacy of others
  • intentionally or unwittingly do harm
  • are in violation of the commonly accepted publishing guidelines applicable within the GCC

We define and determine what is “unacceptable content” on a case-by-case basis, and our definitions are not limited to this list.


Because we embrace transparency as well, we pledge to note and explain our reasons for the editorial manipulation or deletion of any comment or link. CIO2CIO is owned and operated by Frontier Communications and guided by an independent advisory board. Frontier Communications may have ongoing commercial interests and relationships. We will disclose proactively as soon as they come to our attention any commercial relationships that might affect or appear to affect the content we publish. We have nothing to hide, seek to hide nothing, and conduct the business of this site in the clear light of day.


We invite you to think out loud, to share your thoughts and reflections, and to transparently participate in the discussion. We will identify ourselves clearly and ask that you honestly identify yourself before participating.
We believe that, in most cases, anonymous or pseudonymous comments are inconsistent with our values and will ask you to log on to CIO2CIO before allowing you to post.
After identifying yourself, should you wish to contribute something to the discussion that you desire to remain anonymous because it puts you at risk of financial or personal harm (i.e., your boss will fire you if s/he finds out you said it), please feel free to submit such content directly to the Editorial Director via This e-mail address is being protected from spambots. You need JavaScript enabled to view it . We will respect your desire for privacy and make a considered, journalistic decision whether and under what conditions to publish your content. As professional journalists, we will not violate your expressed privacy in these instances.
The revelation of trade secrets will not justify this consideration, so please don’t submit them. We deem them unacceptable violations of our core values.
We will strive to be transparent in all that we do, but we understand that the cause of journalistic expression sometimes requires the use of unnamed sources. When and if we cite unnamed or pseudonymous sources in our reporting, we will clearly state our actions and explain them.


Every online space on CIO2CIO where user generated content is published must have someone editorially responsible for that content and should have a host to provide a visible and active presence and a moderator who can remove illegal or inappropriate content. User generated content is moderated in one of three ways:

  • Pre-moderation is where material cannot be accessed by visitors to the website until the moderator has seen it and decided it is suitable for posting.
  • Post-moderation is where the moderator sees the material after it has been posted and decides whether it is suitable to remain.
  • Reactive moderation is where visitors to the website alert the moderator to an inappropriate or offensive message.



We hope that these thoughts shed light on our intentions, processes, and desires. As our thinking and experience evolve, we will amend this statement as needed to more clearly communicate who we are and what we seek to achieve.
We hope that CIO2CIO makes a positive and significant contribution to the marketplace of ideas, and we will do everything in our power to uphold these values and goals in everything we do.

The Editorial Team

Add this page to your favorite Social Bookmarking websites
Reddit!! Mixx! Google! Live! Facebook! StumbleUpon! LinkedIn! TwitThis Joomla Free PHP
  • Poll
  • Login
  • Search

Does your organization use big data?

Follow CIO2CIO on: