20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities for safe computing Your questions & discussion
20 Oct., 1999 UAF Computing & Networking Policies2 Rules or common sense responsibility? Manage university resources for Reliable access Reasonable allocation of resources Facilitate your work Communication & collaboration Safe work environment
20 Oct., 1999 UAF Computing & Networking Policies3 External Authorities Criminal law enforcement Cracking or disrupting networks Use for fraud, threats, … Litigation or threat of it Copyright enforcement Use restrictions of funding agencies or network providers
20 Oct., 1999 UAF Computing & Networking Policies4 University Authorities Board of Regents Policies UA System and UAF Networking and Computing Departmental management
20 Oct., 1999 UAF Computing & Networking Policies5 Scope & impact of authorities
20 Oct., 1999 UAF Computing & Networking Policies6 What network abuses can disconnect me? l Disruption of network: equipment, software, or intentional l Legal requirement l Unusual volume degrades others’ use l Always attempt voluntary resolution before disconnecting!
20 Oct., 1999 UAF Computing & Networking Policies7 What about personal use? Incidental personal use generally OK, e.g., - personal , - browse news, - order book Caveats no business, political campaigning, or illegal activities! Cannot represent personal communications as official university Department may have more restrictive rules
20 Oct., 1999 UAF Computing & Networking Policies8 What about pornography? Content-based restrictions generally unsupportable, but Illegal pornography is illegal! Other pornographic material may still be regarded as harassment or creating a hostile work environment
20 Oct., 1999 UAF Computing & Networking Policies9 Your files generally not subject to open records act unless they are indeed the records of official actions. and other files on shared systems generally have presumption of privacy - but about as secure as a post card! Are my messages or other files private?
20 Oct., 1999 UAF Computing & Networking Policies10 “When can techies see my files?” l Information Resource folks may for valid technical or management reasons Incidentally as part of normal management of shared resources (e.g., mis-addressed ) As needed to diagnose failures l Content remains confidential unless explicitly escalated by senior officer
20 Oct., 1999 UAF Computing & Networking Policies11 Clearly work-related files (department correspondence or budget documents) – at any time. Where expectation of privacy exists, need a reasonable basis for looking. “When can my boss demand to see files?”
20 Oct., 1999 UAF Computing & Networking Policies12 With a search warrant Or a subpoena When can the cops see my files?
20 Oct., 1999 UAF Computing & Networking Policies13 A few materials are illegal to send threats, secrets, illegal pornography Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional hate speech, intimidation, pornography What restrictions are there on “offensive” materials?
20 Oct., 1999 UAF Computing & Networking Policies14 What are my responsibilities for safe computing? Respect rights of others Civility; respect for others’ privacy Common-sense restraint Work-related use; identify yourself Recognize inherent limits to privacy Back up your work
20 Oct., 1999 UAF Computing & Networking Policies15 Encryption makes messages tamper-proof and unreadable without a key Good way to protect sensitive material and to guarantee authenticity Need development of a key infrastructure to manage keys PGP available now What about encryption?