Presentation is loading. Please wait.

Presentation is loading. Please wait.

20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities.

Similar presentations


Presentation on theme: "20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities."— Presentation transcript:

1 20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities for safe computing Your questions & discussion

2 20 Oct., 1999 UAF Computing & Networking Policies2 Rules or common sense responsibility? Manage university resources for Reliable access Reasonable allocation of resources Facilitate your work Communication & collaboration Safe work environment

3 20 Oct., 1999 UAF Computing & Networking Policies3 External Authorities Criminal law enforcement Cracking or disrupting networks Use for fraud, threats, … Litigation or threat of it Copyright enforcement Use restrictions of funding agencies or network providers

4 20 Oct., 1999 UAF Computing & Networking Policies4 University Authorities Board of Regents Policies UA System and UAF Networking and Computing Departmental management

5 20 Oct., 1999 UAF Computing & Networking Policies5 Scope & impact of authorities

6 20 Oct., 1999 UAF Computing & Networking Policies6 What network abuses can disconnect me? l Disruption of network: equipment, software, or intentional l Legal requirement l Unusual volume degrades others’ use l Always attempt voluntary resolution before disconnecting!

7 20 Oct., 1999 UAF Computing & Networking Policies7 What about personal use? Incidental personal use generally OK, e.g., - personal e-mail, - browse news, - order book Caveats no business, political campaigning, or illegal activities! Cannot represent personal communications as official university Department may have more restrictive rules

8 20 Oct., 1999 UAF Computing & Networking Policies8 What about pornography? Content-based restrictions generally unsupportable, but Illegal pornography is illegal! Other pornographic material may still be regarded as harassment or creating a hostile work environment

9 20 Oct., 1999 UAF Computing & Networking Policies9 Your files generally not subject to open records act unless they are indeed the records of official actions. E-mail and other files on shared systems generally have presumption of privacy - but about as secure as a post card! Are my e-mail messages or other files private?

10 20 Oct., 1999 UAF Computing & Networking Policies10 “When can techies see my files?” l Information Resource folks may for valid technical or management reasons Incidentally as part of normal management of shared resources (e.g., mis-addressed e-mail) As needed to diagnose failures l Content remains confidential unless explicitly escalated by senior officer

11 20 Oct., 1999 UAF Computing & Networking Policies11 Clearly work-related files (department correspondence or budget documents) – at any time. Where expectation of privacy exists, need a reasonable basis for looking. “When can my boss demand to see files?”

12 20 Oct., 1999 UAF Computing & Networking Policies12 With a search warrant Or a subpoena When can the cops see my files?

13 20 Oct., 1999 UAF Computing & Networking Policies13 A few materials are illegal to send threats, secrets, illegal pornography Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional hate speech, intimidation, pornography What restrictions are there on “offensive” materials?

14 20 Oct., 1999 UAF Computing & Networking Policies14 What are my responsibilities for safe computing? Respect rights of others Civility; respect for others’ privacy Common-sense restraint Work-related use; identify yourself Recognize inherent limits to privacy Back up your work

15 20 Oct., 1999 UAF Computing & Networking Policies15 Encryption makes messages tamper-proof and unreadable without a key Good way to protect sensitive material and to guarantee authenticity Need development of a key infrastructure to manage keys PGP available now What about encryption?


Download ppt "20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities."

Similar presentations


Ads by Google