Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
IT Technical Support Policies and Procedures South Nottingham College.
Security Controls – What Works
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
What is it? A set of rules that restricts the ways in which a network, website or system may be used. New members are usually asked to sign an AUP before.
For Students of Humble ISD
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Induction in IT Services for New Students IT Services Training Team.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Documenting Network Design
Information Security Information Technology and Computing Services Information Technology and Computing Services
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
DATA SECURITY AND YOU! W/ DAVE California Center for Population Research.
Chapter 7: Using Windows Servers to Share Information.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Security and backups GCSE ICT.
Confidential Data Security Strategies Based upon the ESG “Outside-In” Confidential Data Security Model © 2009 Enterprise Strategy Group Vendor Channel.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Computer & Network Security
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Database Administration
Information Systems Security
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Policies CIT 380: Securing Computer SystemsSlide #1.
Information Security Training for People who Supervise Computer Users.
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Teleworking Effectively Or, how to work from home without SNA or a token. Don’t be this guy:
Small Business Security Keith Slagle April 24, 2007.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Introduction TO Network Administration
Security and Ethics Safeguards and Codes of Conduct.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computer Security Sample security policy Dr Alexei Vernitski.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Todays’ Agenda What is the Tenafly AUP? Answer the following: What do the letters AUP stand for? What is the definition of an AUP? What are the 2 main.
Lecture 14: Business Information Systems - ICT Security
Cloud Testing Shilpi Chugh.
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
ITCC Report to Faculty Senate, October 2013
12 STEPS TO A GDPR AWARE NETWORK
Dos and Don’ts.
Online software and backups
Presentation transcript:

Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, or the Internet. Provides a framework for the definition of Information Technology and user responsibilities for on site campus access and telecommuting community. These include: Security Privacy Backup Proper Use Unauthorized Access

Information Technology Acceptable Use Policy For the telecommuting user community, a number of best practices will help ensure that University resources are properly protected. ITSD will provide the employee with a desktop or laptop to perform work. University data may only be accessed with computer equipment provided and built by ITSD to University standards. The hard drive will be encrypted McAfee Anti-Virus software will be installed Laptops will be loaded with Computrace (a form of LoJack) Additional technology tools may be installed Backup of data is recommended on a regular basis, or as needed VPN access is required to access University software systems ITSD has made available Crashplan, a cloud based backup solution

Information Technology Acceptable Use Policy Important Links: Acceptable Use Policy All ITSD Policies Crashplan Backup Solution