Download presentation
Presentation is loading. Please wait.
Published byLucas Morris Modified over 9 years ago
1
20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities for safe computing Your questions & discussion
2
20 Oct., 1999 UAF Computing & Networking Policies2 Rules or common sense responsibility? Manage university resources for Reliable access Reasonable allocation of resources Facilitate your work Communication & collaboration Safe work environment
3
20 Oct., 1999 UAF Computing & Networking Policies3 External Authorities Criminal law enforcement Cracking or disrupting networks Use for fraud, threats, … Litigation or threat of it Copyright enforcement Use restrictions of funding agencies or network providers
4
20 Oct., 1999 UAF Computing & Networking Policies4 University Authorities Board of Regents Policies UA System and UAF Networking and Computing Departmental management
5
20 Oct., 1999 UAF Computing & Networking Policies5 Scope & impact of authorities
6
20 Oct., 1999 UAF Computing & Networking Policies6 What network abuses can disconnect me? l Disruption of network: equipment, software, or intentional l Legal requirement l Unusual volume degrades others’ use l Always attempt voluntary resolution before disconnecting!
7
20 Oct., 1999 UAF Computing & Networking Policies7 What about personal use? Incidental personal use generally OK, e.g., - personal e-mail, - browse news, - order book Caveats no business, political campaigning, or illegal activities! Cannot represent personal communications as official university Department may have more restrictive rules
8
20 Oct., 1999 UAF Computing & Networking Policies8 What about pornography? Content-based restrictions generally unsupportable, but Illegal pornography is illegal! Other pornographic material may still be regarded as harassment or creating a hostile work environment
9
20 Oct., 1999 UAF Computing & Networking Policies9 Your files generally not subject to open records act unless they are indeed the records of official actions. E-mail and other files on shared systems generally have presumption of privacy - but about as secure as a post card! Are my e-mail messages or other files private?
10
20 Oct., 1999 UAF Computing & Networking Policies10 “When can techies see my files?” l Information Resource folks may for valid technical or management reasons Incidentally as part of normal management of shared resources (e.g., mis-addressed e-mail) As needed to diagnose failures l Content remains confidential unless explicitly escalated by senior officer
11
20 Oct., 1999 UAF Computing & Networking Policies11 Clearly work-related files (department correspondence or budget documents) – at any time. Where expectation of privacy exists, need a reasonable basis for looking. “When can my boss demand to see files?”
12
20 Oct., 1999 UAF Computing & Networking Policies12 With a search warrant Or a subpoena When can the cops see my files?
13
20 Oct., 1999 UAF Computing & Networking Policies13 A few materials are illegal to send threats, secrets, illegal pornography Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional hate speech, intimidation, pornography What restrictions are there on “offensive” materials?
14
20 Oct., 1999 UAF Computing & Networking Policies14 What are my responsibilities for safe computing? Respect rights of others Civility; respect for others’ privacy Common-sense restraint Work-related use; identify yourself Recognize inherent limits to privacy Back up your work
15
20 Oct., 1999 UAF Computing & Networking Policies15 Encryption makes messages tamper-proof and unreadable without a key Good way to protect sensitive material and to guarantee authenticity Need development of a key infrastructure to manage keys PGP available now What about encryption?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.