University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Protect Our Students Protect Ourselves
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
BUSINESS B2 Ethics.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
District networked computers give students access to a variety of educational programs, applications programs as well as the Internet. Providing a safe.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Business Plug-In B7 Ethics.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Monitoring Employees on Networks: Unethical or Good Business?
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
1 and Internet Safety The internet is a vastly growing research tool that offers insight to the world in which we live. Through the internet we are.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Computer Technology Timpview High School
Woodland Hills School District Computer Network Acceptable Use Policy.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Presentation of Acceptable Use Policy Kathryn Thomas UMUC EDTC 620 Summer 2012.
CITY OF PHOENIX RECORDS MANAGEMENT AND E-PRIVACY Margie Pleggenkuhle City Clerk Department March 18, 2004.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
{ Social Networking Policy Expectations and Guidelines for City of Aspen Falls Employees.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
PowerPoint slide sketch sheet
The Acceptable Use of Technology
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Ethical Use of Computers
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel

Universities and the Right to Privacy A university should be allowed to monitor university networks and connected computers for improper activity.

University Privacy Policies Duke ’ s Privacy Policy: Neither the University nor its agents restrict the content of material transported across its networks. While the University does not position itself as a censor, it reserves the right to limit access to its networks or to remove material stored or posted on University computers when applicable University policies, contractual obligations, or state or federal laws are violated. Alleged violations will receive the same academic due process as any other alleged violation of University policy, contractual obligations, or state or federal laws. UNC’s Privacy Policy: Wherever possible in a public setting, individuals' privacy should be preserved. However, there is no guarantee of privacy or confidentiality for data stored or for messages stored or sent on University- owned equipment. Persons with questions about the applicability of this Policy to specific situations should contact the Office of University Counsel Violations of University policies governing the use of University electronic resources, including mail services, may result in restriction of access to University information technology resources in addition to any disciplinary action that may be applicable under other University policies, guidelines or implementing procedures, up to and including dismissal.

Networks are the University’s Property The university owns and operates the network and may regulate it however it pleases By using the network services provided by the University, the students and employees of the University are consenting to act under whatever standards the University sets. Granted, we are essentially paying for the services. However, just because we pay for the services, it does not mean that we can use it however we please. There are still rules and regulations that must be followed.

Promoting a User-Friendly/ Safe Environment The ability to monitor is essential to having a student body that feels comfortable. The university should protect everyone who uses the network from viruses and computer- related problems. The university should be able to investigate other matters that could threaten student safety, like threats of violence or other instances in which the safety of other students comes into question.

Legal Concerns It is in the best interest of the university to protect itself and its students from getting into trouble with the law. When students get involved with lawsuits that involve the internet service that is provided by the university, the university is either directly or indirectly involved as well. –lawsuits are costly—Implications: higher tuition costs –lawsuits are bad for the university’s reputation –“Steven Zink, UNR (University of Nevada, Reno)’s vice president of information technology, said the purpose of the policy is to help keep the students and the university out of court for using music-sharing networks like the former Napster.”

Network Monitoring and Privacy Concerns University network monitoring does not compromise student privacy any more than other sorts of law enforcement currently in effect. Both router transaction logs and screenings are done by automated systems or software programs which rarely, if ever, actually look at the content of the web pages visited or messages being received. In addition, no person is actually involved in monitoring.

Current Applications of Monitoring Bandwidth Monitors –Systems that measure the amount of bandwidth a computer is using and impose restrictions on the heaviest users Copy Monitors –Software that works inside a router or a gateway to the internet from the network that copies and identifies anything from a FTP or a P2P program Preemptive Monitors –Monitors that do not judge what is acceptable or unacceptable, but instead prohibit all file sharing operations in its network