Effective Restrictions on Internet Usage What is our responsibility? & What can I do?

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Northside I.S.D. Acceptable Use Policy
Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Anti-Harassment Training What Employees Need to Know AAIM - Business and Legal Resources
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
IT Security for Users By Matthew Moody.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Sexual Harassment in the Workplace ICRMT Legal Counsel O'Halloran, Kosoff, Geitner & Cook, P.C.
It’s fairly straightforward: * sexual harassment can cause emotional damage * ruin personal lives * end careers. * It can also cost money; lots of money..
IT security By Tilly Gerlack.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Because you need to protect your computers!!! By: Ashley Hubbard.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Cyber Safety Jamie Salazar.
1 Why Use Technology?  Research  Independent Learning  Immediate Feedback  Organization.
Computer Security By Duncan Hall.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Don’t let them catch your computer!!!!!
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Laws and Rules That Govern Internet Safety Ashley Martin.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Windows Administration How to protect your computer.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
For more information on Rouge, visit:
Information Technology Acceptable Use An Overview
TECHNOLOGY PROTECTION
Presentation transcript:

Effective Restrictions on Internet Usage What is our responsibility? & What can I do?

St. Clair County Technology Cooperative St. Clair County Board of Education and County Commission Bryan Price – Network Support Manager Through a cooperative agreement the county commission funds the technical staff of the BOE to manage and aid in technical services for all county technologies

St. Clair County’s Network 200 Computers 17 Servers MS Windows Linux IBM – AS400 IBM – RS6000 IT Steering Committee – meets quarterly to discuss and vote on technology plans, made up of members of each dept… –Rev. Comm- Probate- Maintenance –Administration- Technology –Sheriff Dpt.-Transportation

Effective Restrictions on Internet Usage 30% of companies have terminated employees for inappropriate web use 40% Of internet use is not work related 70% of porn traffic is accessed between 9am and 5pm on work days –Source: N2H2 Secure Computing Corporation

From the EEOC website… When is an employer legally responsible for harassment by a supervisor? When is an employer legally responsible for harassment by a supervisor? An employer is always responsible for harassment by a supervisor that culminated in a tangible employment action. If the harassment did not lead to a tangible employment action, the employer is liable unless it proves that: 1) it exercised reasonable care to prevent and promptly correct any harassment; and 2) the employee unreasonably failed to complain to management or to avoid harm otherwise. The harasser can be the victim's supervisor, an agent of the employer, a supervisor in another area, a co-worker, or a non- employee. The victim does not have to be the person harassed but could be anyone affected by the offensive conduct.

… all of that to say… Take reasonable action to insure that this is not even an issue. You are not obligated to provide full and free access to the internet for all employees. Be Practical – A Deputy Investigator for your county may need un-filtered access for his line of work.

Our Responsibility If we choose to provide internet access, we have a responsibility to provide a useable and safe internet access to our employees, while protecting ourselves as employers from litigation This can be accomplished internally (by your technical support team) or externally (by contracting these services) Protect your county’s computers from malicious activities –Five primary steps to safe internet usage Regular Operating System Updates Regular Updates of Virus Protection software Spam and filtering Firewall – blocking unnecessary websites Disable or password protect shared drives

Bandwidth Management Bandwidth is the speed of your internet connection. –Activities that use your bandwidth… Instant Messaging Streaming Audio & Video Surfing the Net Downloading programs (screen savers, pictures, backgrounds, etc.) Each of these activities can have Professional and Personal uses, your job is to manage each!

Develop a Network Use Policy Having an up-to-date practical network / internet use policy in place, will clearly define the boundaries to your employees! –You can find an example on our website at and then click on left hand tab labeled “IT Presentation”

Don’t just build it and forget it… As technologies change daily you need to stay abreast of the current threats. One year ago our network concerns were… Windows Updates, Antivirus, and Firewalls Today we have added Spam, Spy ware, Add ware, and Network Intrusion

References … CIPA Website (Child Internet Protection Act) St. Clair County website The End