Internet Use by the General Public Guidelines from the AVCC, Content, University IT Systems and the Internet provided framework for addressing copyright.

Slides:



Advertisements
Similar presentations
Confidentiality: What Is Our Responsibility?
Advertisements

Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
Patient Public Involvement (PPI) Policy What is PPI? PPI means putting patients and public at the centre of all that we do. It encourages the active participation.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Security Controls – What Works
Password?. Project CLASP: Common Login and Access rights across Services Plan
2/16/2010 The Family Educational Records and Privacy Act.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Using Digital Credentials On The World-Wide Web M. Winslett.
1 CS 502: Computing Methods for Digital Libraries Lecture 26 Techniques of Access Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Yusuf İ slam Ş EFLEK 11 TM/A 85.  An acceptable use policy is a set of rules applied by the owner/manager of a network, website or large computer system.
Network security policy: best practices
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Protecting Sensitive Information PA Turnpike Commission.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Confidential © IDA Singapore APEC-OECD Cooperative Initiative on Regulatory Reform February 2001 Singapore.
Research Week: Copyright, Commercialisation and IP Research Week: Copyright, Commercialisation and IP  opyright for postgraduate students and researchers.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Other Laws (Primarily for E-Government) COEN 351.
PERSEU S : Portal-enabled Resources via Shibbolized End-user Security 3 May 05Spring 2005 Internet2 Member meeting 1 News from the ‘misty’ Albion: Shibboleth.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
CAUL Strategic Plan Review 2003 Objectives & Actions.
Universal Design in Legislation, Policy and Practice "Non Principal Private Residence Online Payments Service - realising savings and efficiencies by moving.
“What’s Ethics Got To Do With It” Presentation to the Canberra Evaluation Forum Gary Kent Head Governance Australian Institute of Health and Welfare.
Personalized Portal A Key Element in a Web Vision Personalized Portal: a Critical Element of a Web Strategy What is a Personalized Institutional Portal?
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Biometric Access Project. CGCSA – Section 21 company =non profit organisation Funding received from members Income utilised to provide service to members.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Peter Ziu Northrop Grumman ACS-WG Grid Provisioning Appliance Concept GGF13, March 14, 2005 (Revised 8/4/2005)
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
UK LOCKSS Alliance: Investigation into Private LOCKSS Networks Adam Rusbridge EDINA, University of Edinburgh.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Managing Access at the University of Oregon : a Case Study of Scholars’ Bank by Carol Hixson Head, Metadata and Digital Library Services
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Social, Ethical, Legal and Human Issues The Role of the Technology Coordinator Johnson Bible College, Dr. Tony Krug.
FIRST CONTRACTUAL SAVINGS CONFERENCE : SUPERVISORY AND REGULATORY ISSUES IN PRIVATE PENSIONS AND LIFE INSURANCE SUPERVISORY AND REGULATORY PRACTICES IN.
Chapter 1 Computer Technology: Your Need to Know
Acceptable Use Policy (Draft)
UTS Library 2016 workshop Copyright for Researchers
Data and Applications Security Developments and Directions
Current ‘Hot Topics’ in Information Security Governance Auditing
How many of these apps do you really know?
GDPR support January GDPR support January 2018.
The Strategic Content Alliance
Sabrina Iavarone Senior User Services Officer
Student Privacy in the age of big data
Student Data Privacy: National Trends and Wyoming’s Role
Presentation transcript:

Internet Use by the General Public Guidelines from the AVCC, Content, University IT Systems and the Internet provided framework for addressing copyright infringement and other risks relating to the use of the Internet. Defined “good-practice” for institutional authentication contain explicit exceptions and acknowledgement of the role of Libraries in providing access to licensed resources (AVCC, 2003) Recent studies highlighted the role of university and public libraries as providers of internet access to the general public who may (otherwise) have little access - importance of this access in building an equitable information society (Hardy & Johanson, 2003; Moore et.al., 2002). Today, most Australian higher-education institutions continue to provide some level of internet access for the public, although general access to licensed resources may be restricted through authentication (CAUL Survey, 2003).

The Regulatory Environment  Broadcasting Services Amendment (Online Services) Act Universities and Libraries are acting as Internet Carriage Service Providers - Act prohibits facilitating internet access for minors without parental consent (how do we obtain and record this?)  Licensing and contractual arrangements with information vendors  A variety of institutional policies on network access, eg. - UQ Cybrary Internet Access conditions of UseUQ Cybrary Internet Access conditions of Use - UQ Cybrary Trusted ZoneUQ Cybrary Trusted Zone - UQ IT Security Management PolicyUQ IT Security Management Policy Internet access for the general public is provided within a complex framework of regulations, policies and restrictions. These include -

Authentication / Policy Issues How do we identify who is using our services and to some extent, what they are accessing? Authentication mechanism - LDAP, patron id, smart card, ATHENS type arrangements ? However, members of the public are rarely in easily accessible directories. How to identify which services and resources visitors are allowed to access? The role of the Library as part of the University’s Community Service contribution (UQ strategic Plan) Accessibility for members of the public with disabilities or special needs Who bears the “risk” in instances of breach of license or copyright? Privacy concerns

Security / Technology Issues Managing access for users with multiple identities (ie. students who are staff or on multiple contracts) Unauthorised sharing of passwords or login details How do we effectively manage access control lists for the “entire internet”? Controlling the ability to save and “take-away” massive amounts of data via storage media such as USB devices or rewriteable media What to do about visiting academics? Conference visitors? Who is responsible for investigating or responding to allegations of illegal activity or breach of copyright? What “private” information are we allowed to collect (browser history, cookies, sites visited etc) to assist us in the investigation of possible security breaches? Ensuring a consistent approach is taken across the institution – including in the residential colleges

UQ solution Development of “trusted zone” Includes library catalogue, all licensed resources, internet sites as identified by staff and requested by users Authentication thereafter Authentication achieved through directories of staff (including adjuncts) No general internet use for general public

Other Considerations Who pays for the traffic costs associated with use by the general public (especially in light of the proposed changes to AARNET charges) Providing some public access, whilst still ensuring appropriate access to resources (and computers) for our “core” clients (students & staff) A number of additional staffing costs - username/password creation and management - training, support and assistance - management of the requirement for parental consent for visitors under 18 The risk of litigation by industry lobby groups, content owners and publishers Who is “in” the University community and who is not? Alumni? Commercialisation partnerships? Adjunct appointments? Jointly funded facilities (ie. Hospital Libraries)

References Australian Broadcasting authority (1999), Broadcasting Services Amendment (Online Services) Act 1999, ABA. Canberra. AVCC (2003), Content, University IT Systems and the Internet, available at es/Code_of_Conduct_for_Universities.pdf es/Code_of_Conduct_for_Universities.pdf CAUDIT (2004), Internet Accounting (Multi-User Systems) Survey, available at CAUL (2003), Internet Access & Authentication Survey, available at Hardy, G., Johansen, G., (2003) Characteristics and choices of public access Internet users in Victorian public libraries, Online Information Review, 27, #5 pp Moore, E.J., Gordon, A.C., Gordon, M.T. and Heuertz, L. (2002), It’s Working: People from Low-Income Families Disproportionately Use Library Computers, report to the Bill & Melinda Gates Foundation US Library Program on a survey of library patrons.