Acceptable Use Policy.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Northside I.S.D. Acceptable Use Policy
Let’s Talk About Cyber Security
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
By Stoney Pritchett.  The rules of etiquette that apply when communicating over computer networks, especially the internet.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Boyertown Area School District Acceptable Use Policy.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
Otterbein University Welcomes You New Student Information Guide Sep 2010.
CPS Acceptable Use Policy Day 2 – Technology Session.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
Internet Driver’s License è Training è Test è Signed Internet Use Agreement.
Computer Ethics for Computer Users
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Clark County School District (CCSD)
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
ITServ (IT Support Services). Areas of services n Campus network n Internet services n Multimedia services n Support to On-line Student Information System.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Fort Bend ISD Acceptable Use Policy Student Training.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Operational Circular No 5 Use of CERN Computing Facilities.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
1 and Internet Safety The internet is a vastly growing research tool that offers insight to the world in which we live. Through the internet we are.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Security and Ethics Safeguards and Codes of Conduct.
Computer Technology Timpview High School
Woodland Hills School District Computer Network Acceptable Use Policy.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Windows Vista Configuration MCTS : Productivity Applications.
Information Technology Overview Welcome to NC State!
Campus wide IT Services. Provided by: ITServ (intERLab) Contact point: Helpdesk.
Campus wide IT Services
Internet Acceptable Use Policy
Crosby ISD Acceptable Use Policy Training
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
What is Information Security?
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Acceptable Use Policy

Your Responsibilities AIT provides you Internet access and computing facilities and services. You are responsible for effective, lawful and ethical use of these resources. This Acceptable Use Policy covers the Internet access, computer facilities and services available for free in classes, laboratories, meeting rooms and all academic area of the campus.

Acceptable Use Policy (AUP) Regulations to ensure proper use of Institute’s Internet and computing facilities/services by users Available at http://www.ait.asia/it_committee/aup Compulsory acceptance of the agreement

AUP: Responsible use Ensure proper use and fair sharing of limited capacity of Internet/computing resources Protect privacy Uphold laws and common ethics

AUP: Proper use For academic and research activities only Schedule high volume download at night time Not for entertainment or personal use Downloading and viewing entertainment, game, Internet phone Not for commercial activities

AUP: Protect privacy Use your own user authentication Do not give your account to others Logout every time you finish accessing internet from a computer: Popup logout window AIT main webpage -> webmail -> Logout from AITNet https://auth-gw.ait.ac.th/auth/logoutpage.pl

AUP: Observe laws Do not attempt to read, copy, modify mails or data of other people Do not carry out unlawful/illegal activities on Internet (Thai Computer Criminal Act BE 2550) Observe copyright law (e.g. use only licensed software/resources, do not infringe on any intellectual property, do not download illegal programs and resources)

AUP: Observe common ethics Decent, polite, no harassment nor intimidation Uphold the good name of the Institute No private or commercial announcement to any mailing list No anonymous or faked email and Web board/posting

AUP: Disciplinary action Top users are being closely monitored Upon infringement: Official warning Temporary or permanent suspension of account and network access Further disciplinary action, including expulsion

Unrestricted Internet Access

Unrestricted Internet Access In campus residential area Automatic and compulsory in every dorms Private Internet services with a cost 400 baht/month, charged with your rental ADSL like at 10 Mbps One connection per room Use your AIT email account to create UIA account

Unrestricted Internet Access For any usage you like No Acceptable Use Policy But you must follow the law of the land Ex: no illegal download of copyrighted material Four months exclusion in case of infringement

Unrestricted Internet Access Beware of misconfigured devices: Share your connection with a router Install WiFi access AIT helpdesk can helps you with configuration Misconfiguration cause disruption One month exclusion if you cause disruption to others For details: http://www.ait.asia/it_committee/uia

A word about security

A word about security AIT is well protected anti-viruses anti-spam suspect material is filtered out But you need to remain careful all the time

Phishing Major threat is phishing, it is sophisticated Use caution, ask yourself: do you know the sender? does the sender uses language? does he usually send you this sort of message? does the sender use that signature? why the sender is sending you this file/message? do you trust the sender to be actively looking for viruses?

A rule of thumb AIT helpdesk will never, ever, ever, under no circumstance, ask you to send your password by email. Never. Ever. They will not ask you to connect to some strange web page.

A word of advice