LEGAL AND ETHICAL USE AND PRACTICE Board Report on Technology Threats
Three Potential Threats Penetration of systems at all levels or points-of- entry Damage or Tampering through code manipulations Disaster Recovery Plans
Penetration of Systems Firewall penetration, Computer terminals, Server access, Kiosk Hackers Negligent users
Damage or Tampering Spam Viruses Worms
Disaster Recovery Plans Fire Flood, Terrorist, Acts of god
Type of Systems Threatened Student Information Systems VirtualUnited the Course Management System (CMS) Outlook Web Access - Student System
Student Information Systems Protection Solutions, Practice and Procedure Recommendations Window Servers: Lock Servers Secure with Socket Layer (SSL) Software Computer Access Personal access Password protection Frequently change passwords
Student Information Systems cont. Kiosk Lock Cabinets Secure all Ports- CD-ROM drives, Serial ports, Parallel Ports, USB Ports, FireWire Ports, Ethernet ports
Course Management Systems Protection Solutions, Practice and Procedure Recommendations Database moved from root directory Passwords changed Computers Locked Offices Locked
Outlook Web Access Protection Solutions, Practice and Procedure Recommendations Multiple spam filters Separate Wi-Fi Internet Firewalls Frequent scanning of system LDAP system Back-up storage Locking servers
Etiquette Etiquette You may want to SHOUT only a single word or two to emphasize a point. Don't send private messages through . Use an appropriate subject line; this will help the recipient locate you message Pay attention to grammar and spelling. Sign all of your s with your name. Don't forward s without permission. Assume all material is copyright.
Etiquette Discussion Board Etiquette Be sensitive to others. Treat other people with respect and courtesy, especially in reference to social, cultural, and ethnic differences. Don't use sarcasm. It often falls flat and doesn't come across as you intended. Be careful with humor. The reader doesn't have the benefit of your facial expression, body language, or tone of voice. You can use emoticons or " body language" such as ;) for a wink or :( for a frown. Cooperate and share. Consider yourself a quest on the system just as if you were in someone's home. Be willing to share information with others on the Internet. In exchange for help and information you receive, be willing to answer questions and to share your resources. Carefully consider copyright. Just because something can be copied electronically doesn't mean it should be distributed without permission. Unless stated otherwise, all material on the Internet is copyrighted. Be alert for obscenity. (Smaldino, 2008, pg. 198)