Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
BUSINESS B2 Ethics.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Acceptable-Use Policies: Human Defenses Michael Swart, Steven, Daniel Connor.
Boyertown Area School District Acceptable Use Policy.
Riverside Community School District
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
Business Plug-In B7 Ethics.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
00870B2F.0/Internet%20Safety.jpg.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Traffic Control & Tort Liability
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Technology and the Law R. Keith Booker, Ed.S Memphis East High School.
INTERNET SAFETY.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Kate Neonakis Directors’ Liability in a Not-for-Profit Organization.
Health & Safety Management “and a few other things for your consideration”
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
CHAPTER FOUR OVERVIEW SECTION ETHICS
SAVED BY THE BELL: INTERVENING IN STUDENT VIOLENCE
IS4680 Security Auditing for Compliance
Chapter 3: IRS and FTC Data Security Rules
Move this to online module slides 11-56
Introduction to General Medical Conditions
CHAPTER FOUR OVERVIEW SECTION ETHICS
Student User Agreement and Policy 2022
Presentation transcript:

Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson

Introduction  Acceptable-Use Policies provide: –Companies with the ability to provide a non- hostile work environment. –Limit wasting a companies resources 2003 it was reported that 30-40% use was not related to business. Costing US corporations $85 billion in lost production

Case on Point: Allstate Insurance  February 2003, CA DMV cut off Allstate’s access to digital files.  Allstate Employees were stealing customer information  131 Violations of confidentiality rules found

@lert  The most readily calculable cost of an outdated or incomplete AUP is the lawsuit- as is the payoff from implementing a good one.

MCIWorldCom’s AUP Leads to Early Dismissal of Lawsuit  Two employees filed employment discrimination against the company in TX federal court.  The Plaintiff’s claimed: – that another employee had sent out four s that constituted racial harassment. –Their employer was negligent by allowing the corporate system to be used for harassment.

Cont.  Court Dismissed the plaintiff’s claims on the following grounds that MCIWorldCom had: –an established AUP that prohibited discriminatory s –acted consistently in enforcing the policy against the employee who had sent the messages –Taken remedial action to enforce its written policy.

The AUP: Discipline and Diligence Defense Tier

The AUP: Discipline and Diligence Defense TierCont.  Despite increase in litigations policies governing the use of Company computer equipment is seldom strict enough.  Users must operate within the AUP even when it is inconvenient.  High risk habits can only be changed through training, reminders and enforcement.

Dual Functions of the AUP  Security Breach Prevention –Prevents misuse from occurring.  Legal Protection –Protect the organization when prevention techniques fail.

Security Breach Prevention AUP can help to:  inform employees of what they can and can’t do to reduce inappropriate behavior  Clarify expectations about personal use or company equipment  Warn employees that their actions are monitored  Outline the consequences of noncompliance.

Legal Protection  If a company has an enforced AUP then it is supporting evidence that the organization exercised it legal duty to safeguard employees from a hostile work environment.

@lert  An AUP is rendered useless if: –The company has a well written AUP stating that staff should not use company systems for private use. –This policy is widely ignored from the managing director downward. –Even though the AUP is in place it is not enforced. –Therefore it becomes useless.

Legal Theories and Employer Liability Issues  Employers’ liability stem from two longstanding legal doctrines: 1.Respondent Superior Doctrine and Liability 2.Negligent Supervision and Duty of Care

Respondent Superior Doctrine and Liability  Respondent Superior: –Doctrine that holds employers liable for the misconduct of their employees within the scope of their employment.  Convention on Cybercrime –US and 29 other countries –Improve international cybercrime prevention –If a corporation fails to provide proper supervision to employees allowing cybercrimes to occur then the corporation is liable.

Negligent Supervision and Duty of Care  A employer may also be liable for negligent supervision of an employee –Duty of care may extend beyond the scope of employment.  Duty of Care: –A company or person cannot create unreasonable risk of harm to others. –Under this doctrine directors and officers have an obligation to protect their companies business operations. CR->TN

What makes an AUP effective?  Comprehensive scope  Clear Language  Adaptive Content  Extension to Other Company Policies  Enforcement Provisions  Implied Consent  Accountability

Comprehensive Scope  The AUP must apply to all IT resources –Desktop Computers –Laptop Computers –Personal Digital Assistants –All employee owned devices accessing the company network  Must apply to all users of IT resources

Clear Language  The AUP must be concise  Must explain company’s commitment to enforcement  Narrow enough to address known threats  Broad enough to cover new and unanticipated dangers

Adaptive Content  The AUP must be dynamic –Change to adapt to new situations, technological advances  A mechanism for updating the AUP needs to be in place

Extension to Other Company Policies  AUP must manage employees’ expectations  Other policies must be considered –Intellectual Property –Harassment –Right to Privacy

Consent  Adoption of AUP must not be passive  Signed agreement of employees is necessary –Shows acknowledgement of responsibility, procedures, and penalties –Referred to as expressed consent –Different from implied consent

Accountability  Responsibility for AUP development: –Often assigned to IT organization –Requires involvement from outside sources Legal Human Resources Senior Line Management  Individuals who enforce policies should be named within the Acceptable Use Policy

AUP Sample Items  Purpose and Scope –Policy addresses all IT resources –Intended to promote safety –Key Objectives: Maintain non-hostile workplace environment Prevent discrimination Protect company against computer crimes –Company performance and survival depend on security measures described in this AUP.

AUP Sample Items cont.  Acceptable Use Policy Guidelines –IT Resources are company property To be used only by those employed by the company Only to be used for business purposes –IT Resources are to be used in accordance with all applicable laws –Creation or transmission of any files deemed obscene or indecent is prohibited –The company has a right to review and observe all electronic communications

AUP Sample Items cont.  Provisions and Prohibitions –Company users names and passwords Only to be used for business purposes Not to be given out or used for any personal electronic communications –Users should check their company daily Delete unwanted messages –All information sent, received, created or stored is the property of the company –Users must scan all downloaded files for viruses

AUP Sample Items cont.  Compliance –The company may choose to monitor its resources, including sent and received Internet usage Computer files and faxes received and sent Any file for content-installed software for licensing –Users will not view other’s without permission –Users are to report any violations to their supervisor

Armstrong Atlantic State University’s Acceptable Use Policies AASU AUP displays all the characteristics of an effective AUP (recall):  Comprehensive scope  Clear Language  Adaptive Content  Extension to Other Company Policies  Enforcement Provisions  Implied Consent  Accountability ml

Questions??