What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Welcome to the SPH Information Security Learning Module.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
Data Ownership Responsibilities & Procedures
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Security, Privacy, and Ethics Online Computer Crimes.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Security Awareness Norfolk State University Policies.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.
An Educational Computer Based Training Program CBTCBT.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
What is Spam? d min.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
HIPAA Privacy What Every Staff Member Needs to Know.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Internet Safety.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Lesson 3 Safe Computing.
Staying Austin College
Lesson 2- Protecting Yourself Online
Lesson 2: Epic Security Considerations
CYBERSAFETY & Personal information
Student User Agreement and Policy 2022
Lesson 2- Protecting Yourself Online
Woodland Hills School District
Protecting Student Data
Presentation transcript:

What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University. We are each responsible for protecting these resources. Being careless with university resources can put your work, your research, your job, even your career at risk.

What are the rules? The Acceptable Use Policy (AUP) contains official guidelines for the responsible use of information technology resources at the University. The AUP describes your rights and responsibilities when using and accessing university resources. Acceptable Use Policy:

IT Compliance Training I. Securing your computer II. Complying with federal copyright law III. Protecting sensitive data IV. Safe electronic communications

I. Securing Your Computer Create strong passwords Protect your UT EID Install security software Log off or lock your computer

Strong Passwords Use a combination of upper and lower case letters, numbers and symbols. Use between 8 to 20 characters. Consider using a phrase, such as: “mYdoghA$fLe&s2”. Use different passwords for your different accounts—especially your university accounts.

Unsafe Passwords Your name, birth date, social security number, address or anything that can personally identify you. Any word found in a dictionary, even spelled backwards. Words using numbers in place of letters (“mym355ag35” or “mymessages”). Keys found next to each other on the keyboard (asdfghjkl). Repeating patterns (aaaaaa or 4444).

Password Guidelines Don’t give them out or share with anyone. Don’t write them down and keep them near your computer. Change your passwords regularly – every 6 months or so. Don’t enable the “Save Password” option if you are prompted to do so.

Protect your UT EID Every student, faculty and staff member is provided with their own UT electronic identification, or EID. The UT Electronic ID Agreement. Your EID acts as your legal signature on university materials. Don’t share it! Don’t trade it! Don’t abuse it!

Installing Security Software Install security software to protect your computer from: Viruses Spyware Spam Update often or set to “auto update” “BevoWare” provides security software licensed by the university for your use Download it at no cost

Log Off or Lock Up Your Computer Log off or lock up your computer when away for any length of time. Physically lock up your computer at the end off the day. Lock access to your office, lab, or work area to prevent theft. It only takes a moment for a thief to steal your computer—and years of your work!

II. Complying with Federal Copyright Law It is against federal law to illegally download copyrighted materials, including: Music Movies Software It is a violation of university policy to use campus resources to illegally download or otherwise infringe on copyrighted materials.

Complying with Federal Copyright Law The university complies with all legal requests regarding copyright infringement. Consequences for employees infringing on copyrights can be very serious: University disciplinary action Large monetary fines Prison terms

III. Protect Sensitive Data All data stored on university resources must be classified into one of three categories based on the need to maintain the data’s Confidentiality Integrity Availability

Category-I Data Considered restricted and confidential. Protected by state or federal law. Never disclose or use Category-I data without proper authorization. Includes: Social security numbers (SSN). Personal information for students, donors or employees. Business data, such as contract terms or status.

Unauthorized disclosure of Category-I data may result in: Cancellation of network access. Criminal prosecution. Category-I data is protected by directives from: UT System, The State of Texas, and Federal Legislation. More information about Category-I is found online at: Category-I Data

Category II & III Data Category-II Data: data subject to an “open records” request, per the Texas Public Information Act. The Texas Public Information Act provides public access to state business and affairs, including work at the University. Category-III Data: data not requiring special protection.

IV. Safe Electronic Communications and instant messages (IM) are not private. Never send a message you wouldn’t want to see in the newspaper. Never send sensitive information, such as account numbers, credit card numbers, passwords, or SSN, via or IM.

Safe Electronic Communications Be suspicious of urgent messages asking for personal information. Delete attachments you aren’t expecting and be cautious if referred to a Web site; viruses and spyware are often spread this way. Only IM with people you invite and never click on a link in an instant message. If you are unsure, contact the sender off-line. But don’t use the contact information provided.

IT Compliance Training Acceptable Use Policy Information Security Office (ISO) 512/

Review Your Knowledge The University of Texas at Austin General Compliance Training Program