Presentation is loading. Please wait.

Presentation is loading. Please wait.

What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.

Similar presentations


Presentation on theme: "What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University."— Presentation transcript:

1 What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University. We are each responsible for protecting these resources. Being careless with university resources can put your work, your research, your job, even your career at risk.

2 What are the rules? The Acceptable Use Policy (AUP) contains official guidelines for the responsible use of information technology resources at the University. The AUP describes your rights and responsibilities when using and accessing university resources. Acceptable Use Policy: www.utexas.edu/its/policies/aup

3 IT Compliance Training I. Securing your computer II. Complying with federal copyright law III. Protecting sensitive data IV. Safe electronic communications

4 I. Securing Your Computer Create strong passwords Protect your UT EID Install security software Log off or lock your computer

5 Strong Passwords Use a combination of upper and lower case letters, numbers and symbols. Use between 8 to 20 characters. Consider using a phrase, such as: “mYdoghA$fLe&s2”. Use different passwords for your different accounts—especially your university accounts.

6 Unsafe Passwords Your name, birth date, social security number, address or anything that can personally identify you. Any word found in a dictionary, even spelled backwards. Words using numbers in place of letters (“mym355ag35” or “mymessages”). Keys found next to each other on the keyboard (asdfghjkl). Repeating patterns (aaaaaa or 4444).

7 Password Guidelines Don’t give them out or share with anyone. Don’t write them down and keep them near your computer. Change your passwords regularly – every 6 months or so. Don’t enable the “Save Password” option if you are prompted to do so.

8 Protect your UT EID Every student, faculty and staff member is provided with their own UT electronic identification, or EID. The UT Electronic ID Agreement. Your EID acts as your legal signature on university materials. Don’t share it! Don’t trade it! Don’t abuse it!

9 Installing Security Software Install security software to protect your computer from: Viruses Spyware Spam Update often or set to “auto update” “BevoWare” provides security software licensed by the university for your use Download it at no cost www.utexas.edu/its/bevoware

10 Log Off or Lock Up Your Computer Log off or lock up your computer when away for any length of time. Physically lock up your computer at the end off the day. Lock access to your office, lab, or work area to prevent theft. It only takes a moment for a thief to steal your computer—and years of your work!

11 II. Complying with Federal Copyright Law It is against federal law to illegally download copyrighted materials, including: Music Movies Software It is a violation of university policy to use campus resources to illegally download or otherwise infringe on copyrighted materials.

12 Complying with Federal Copyright Law The university complies with all legal requests regarding copyright infringement. Consequences for employees infringing on copyrights can be very serious: University disciplinary action Large monetary fines Prison terms

13 III. Protect Sensitive Data All data stored on university resources must be classified into one of three categories based on the need to maintain the data’s Confidentiality Integrity Availability

14 Category-I Data Considered restricted and confidential. Protected by state or federal law. Never disclose or use Category-I data without proper authorization. Includes: Social security numbers (SSN). Personal information for students, donors or employees. Business data, such as contract terms or status.

15 Unauthorized disclosure of Category-I data may result in: Cancellation of network access. Criminal prosecution. Category-I data is protected by directives from: UT System, The State of Texas, and Federal Legislation. More information about Category-I is found online at: www.utexas.edu/its/policies Category-I Data

16 Category II & III Data Category-II Data: data subject to an “open records” request, per the Texas Public Information Act. The Texas Public Information Act provides public access to state business and affairs, including work at the University. Category-III Data: data not requiring special protection.

17 IV. Safe Electronic Communications E-mail and instant messages (IM) are not private. Never send a message you wouldn’t want to see in the newspaper. Never send sensitive information, such as account numbers, credit card numbers, passwords, or SSN, via e-mail or IM.

18 Safe Electronic Communications Be suspicious of urgent messages asking for personal information. Delete attachments you aren’t expecting and be cautious if referred to a Web site; viruses and spyware are often spread this way. Only IM with people you invite and never click on a link in an instant message. If you are unsure, contact the sender off-line. But don’t use the contact information provided.

19 IT Compliance Training Acceptable Use Policy www.utexas.edu/its/policies/aup Information Security Office (ISO) 512/475-9242 abuse@utexas.edu

20 Review Your Knowledge The University of Texas at Austin General Compliance Training Program


Download ppt "What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University."

Similar presentations


Ads by Google