20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities.

Slides:



Advertisements
Similar presentations
Cyber Safety Assessment Review
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Boyertown Area School District Acceptable Use Policy.
 I will not post personal information (includes picture)  I will not agree to meet someone I met online  I will notify teacher of inappropriate messages.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Aaron Cauchi Nurse Informatics
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Overview of the Hernando County School District Anti-Bullying and Harassment Policy January 2009.
Electronic Use Policies.   Social Media  Internet.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Introduction of Communication Protection and Interception Act in Taiwan, R.O.C. Jackie Chien Cybercrime Unit of MJIB Korea KCC, ETRI, KTOA.
Public Communications Law Lecture 15 Slide 1 The Right to Access Information Freedom of speech, and of the press, generally does not include the right.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Lecture 11: Law and Ethics
Monitoring Employees on Networks: Unethical or Good Business?
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
1 National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security & HIPAA Compliance Officer Providence Health Plan.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
DIGITAL SIGNATURE.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Operational Circular No 5 Use of CERN Computing Facilities.
Copyright © Allyn & Bacon 2008 Chapter 7 Liability and Student Records This multimedia product and its contents are protected under copyright law. The.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 The Public Interest Disclosure (Whistleblower Protection) Act.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Tara George Amber Gardner Jennifer Shorter. Advantages Many employers run software that searches for offensives words and highlights problematic s.
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Surveillance around the world
Protection of CONSUMER information
Freedom Independence Transition
ACCEPTABLE USE POLICY GOOD USE OF INTERNET
LAUSD Responsible Use Policy (RUP)
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Confidentiality October 14, 2005.
Internet Safety and Acceptable Use Policies.
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities for safe computing Your questions & discussion

20 Oct., 1999 UAF Computing & Networking Policies2 Rules or common sense responsibility? Manage university resources for Reliable access Reasonable allocation of resources Facilitate your work Communication & collaboration Safe work environment

20 Oct., 1999 UAF Computing & Networking Policies3 External Authorities Criminal law enforcement Cracking or disrupting networks Use for fraud, threats, … Litigation or threat of it Copyright enforcement Use restrictions of funding agencies or network providers

20 Oct., 1999 UAF Computing & Networking Policies4 University Authorities Board of Regents Policies UA System and UAF Networking and Computing Departmental management

20 Oct., 1999 UAF Computing & Networking Policies5 Scope & impact of authorities

20 Oct., 1999 UAF Computing & Networking Policies6 What network abuses can disconnect me? l Disruption of network: equipment, software, or intentional l Legal requirement l Unusual volume degrades others’ use l Always attempt voluntary resolution before disconnecting!

20 Oct., 1999 UAF Computing & Networking Policies7 What about personal use? Incidental personal use generally OK, e.g., - personal , - browse news, - order book Caveats no business, political campaigning, or illegal activities! Cannot represent personal communications as official university Department may have more restrictive rules

20 Oct., 1999 UAF Computing & Networking Policies8 What about pornography? Content-based restrictions generally unsupportable, but Illegal pornography is illegal! Other pornographic material may still be regarded as harassment or creating a hostile work environment

20 Oct., 1999 UAF Computing & Networking Policies9 Your files generally not subject to open records act unless they are indeed the records of official actions. and other files on shared systems generally have presumption of privacy - but about as secure as a post card! Are my messages or other files private?

20 Oct., 1999 UAF Computing & Networking Policies10 “When can techies see my files?” l Information Resource folks may for valid technical or management reasons Incidentally as part of normal management of shared resources (e.g., mis-addressed ) As needed to diagnose failures l Content remains confidential unless explicitly escalated by senior officer

20 Oct., 1999 UAF Computing & Networking Policies11 Clearly work-related files (department correspondence or budget documents) – at any time. Where expectation of privacy exists, need a reasonable basis for looking. “When can my boss demand to see files?”

20 Oct., 1999 UAF Computing & Networking Policies12 With a search warrant Or a subpoena When can the cops see my files?

20 Oct., 1999 UAF Computing & Networking Policies13 A few materials are illegal to send threats, secrets, illegal pornography Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional hate speech, intimidation, pornography What restrictions are there on “offensive” materials?

20 Oct., 1999 UAF Computing & Networking Policies14 What are my responsibilities for safe computing? Respect rights of others Civility; respect for others’ privacy Common-sense restraint Work-related use; identify yourself Recognize inherent limits to privacy Back up your work

20 Oct., 1999 UAF Computing & Networking Policies15 Encryption makes messages tamper-proof and unreadable without a key Good way to protect sensitive material and to guarantee authenticity Need development of a key infrastructure to manage keys PGP available now What about encryption?