Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

Data privacy law in Asia-pacific -introduction to the privacy law in China (mainland China and Hong Kong) Yue Liu
The Impact of the U.S. Constitution
Overview of the Privacy Act
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Spyware: Legislative Responses Jody Blanke Mercer University ALSB, Ottawa August 20, 2004.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
1 Who Gets to Know? Child Welfare & Confidentiality John L. Saxon Institute of Government The University of North Carolina at Chapel Hill February, 2004.
95752:11-1 Security Policy :11-2 Policy Set of detailed rules as to what is allowed on the system and what is not allowed. User Policy System Policy.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
INTERNET and CODE OF CONDUCT
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Class 13 Internet Privacy Law European Privacy.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
New Data Regulation Law 201 CMR TJX Video.
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
SPC Duckwiler, e:\adlaw\cp2.ppt OFFICE OF THE STAFF JUDGE ADVOCATE OVERVIEW Constitutional Basis Statutory Framework Regulations.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Use Policies Deputy Attorney General Robert Morgester
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Regulating Employee Use of Social Media Health Directors Legal Conference April 26, 2012 Diane M. Juffras School of Government UNC- Chapel Hill.
Incident Security & Confidentiality Integrity Availability.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Incident Security & Confidentiality Integrity Availability.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Six: Warrantless Arrests and Searches This multimedia product and its contents are protected.
Data Practices in Minnesota December Outline for this presentation Minnesota data practices laws Classification of government data Government entity.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Heartland Surgical Specialty Hospital, LLC v. Midwest Division, Inc 2007 WL (D. Kan. Apr. 9, 2007)
Group 3 Against the Proposed Amendments to Fed.R.Civ.Proc., Fed.R.Crim.Proc. & Fed.R.Evid.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Welcome to the ICT Department Unit 3_5 Security Policies.
Red Flags Rule An Introduction County College of Morris
Employee Privacy and Privacy of Employee Information
Internet law Business law.
Computers: Tools for an Information Age
PROTECTION OF PRIVACY IN AN EMPLOYMENT RELATIONSHIP
Ethical Use of Computers
The supervision of personal data processing by EU institutions and bodies => data protection and privacy, why it matters, for you as citizens and as EU.
Introduction to Digital Forensics
Presentation transcript:

Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010

Computer and Network Use Policies We have laws. Why do we need Policies? We have laws. Why do we need Policies? - Laws are general principles that admit no context, because they are supposed to apply in any context. - Policies depend on particular personalities, on particular institutions, on particular situations; it is immensely context- dependant.

How to communicate the use policy:  Word of mouth  Employee manuals  Banners

What a Network Use Policy may include : * It may state that the use of the network constitutes consent to monitoring. - This helps establish consent for: ► Provider monitoring ► Law enforcement monitoring

What a Network Use Policy may include : * It may state that the use of the network constitutes consent to retrieval and disclosure of information stored on the network.

What a Network Use Policy may include : * It may state that the use of the network constitutes consent to retrieval and disclosure of information stored on the computer.

Example: An employee sued Univ. of Nebraska: ► Search of employee computer done in response to a civil suit. ► Employee sued for breach of privacy. ► Court found:  No reasonable expectation of privacy because computer use policy indicated computer could be searched when university was responding to discovery  Concurring opinion noted that university policy were to some degree private

What a Network Use Policy may include : * With government networks, the policy may state that the user of the network shall have no reasonable expectation of privacy in the network. - This helps establish that user lacks a reasonable expectation of privacy.

What a Network Use Policy may include : * In the case of non-government network, the policy may make clear that the network system administrator may consent to a law enforcement search. -This gives the system administrator ’ s common authority to consent to a search.

What a Network Use Policy may include : * It may contain limitations or authorizations relating to the purpose of any monitoring / search, and what will be done with the fruits of any monitoring / search. - Do you want to limit why you can monitor? - Where do you want to be able to use the information found?

What a Network Use Policy may include : * It may state what users are unauthorized to access the network, and the consequences of unauthorized use of he network? - Makes it easier to determine what use is unauthorized?

An example of a policy banner: ► WARNING! This computer system is the property of the University of Palestine and may be accessed only by authorized users. Unauthorized use of this system is strictly prohibited and may be subject to criminal prosecution. The University may monitor any activity or communication on the system and retrieve any information stored within the system. By accessing and using this computer, you are consenting to such monitoring and information retrieval for law enforcement and other purposes. Users should have no expectation of privacy as to any communication on or information stored within the system, including information stored locally on the hard drive or other media in use with this unit (e.g., floppy disks, flash memories, CD-ROMs, etc.) - What do you think?

The following topics: * Internet laws * Computer and Internet privacy * Case study: Data Protection Act 1998 (UK) * Computer Crimes * Software licensing