Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail.

Similar presentations


Presentation on theme: "What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail."— Presentation transcript:

1 What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail and the World Wide Web. These technologies are critical to the AUC mission, a mission that includes teaching, research and public service.

2 What is IT contd. IT increases communication opportunities and affects the way we conduct business as a university in the following:

3 Examples of how IT is connected All students, faculty, and staff may have an account. All students, faculty, and staff may have an account. All members of AUC may obtain computer user privileges. All members of AUC may obtain computer user privileges. Students frequently submit assignments using . Students frequently submit assignments using . Committee reports or presentations may appear in Web form only. Committee reports or presentations may appear in Web form only. Communication is increasingly done through the system. Communication is increasingly done through the system.

4 While information technology helps us function, it also requires responsible use from each user. Your actions on this campus can affect people throughout the world. These technologies require responsible use with respect for others. Responsibilities in IT.

5 Information technology is provided to support the essential mission of AUC campus. Your use of information technology is governed by campus policies, and regulations. If an action is against the law it is against campus Policy – whether specifically spelled out or not! Responsibilities of IT contd.

6 You are requested to use information technology with courtesy, respect and integrity. Responsibilities of IT contd.

7 Things to expect As a user of ITS at this facility and in AUC, there are certain things you can expect: I- What can I expect? II- What are my responsibilities? III- Can I …... IV- What can happen? V- What is not against L-A-W OR POLICY? VI- Reporting an incident?

8 I- What can I expect? Is my private? Is my private? Are my files private? Are my files private? What are my First Amendment rights? What are my First Amendment rights? What can I do about being harassed? What can I do about being harassed? What happens if someone complains about me? What happens if someone complains about me?

9 stored on University-operated mail servers requires a password for access and is therefore protected on the mail server, based upon the security strength of that password. is thought of as a postcard, where privacy is supposed to be observed, but in cases when needed to remedy problems with an system, the systems administrators may become aware of the contents of some messages. Is my private?

10 The university respects the contents of your files and does not review file content. However, system administrators may become aware of the content while dealing with some system problems. Are my files private?

11 As an Academic institution, we place great value on freedom of thought and expression. All students associated with the university should exercise their freedoms in a mature, responsible, and respectful manner What are my First Amendment rights?

12 Unfortunately, rudeness is not harassment and neither are other boorish behaviors. If you feel you are harassed, it should be reported to the Dean for Student Affairs Unfortunately, rudeness is not harassment and neither are other boorish behaviors. If you feel you are harassed, it should be reported to the Dean for Student Affairs What can I do about being harassed?

13 II- What are my responsibilities? a- Protecting Resources from Physical Access b- Protecting Resources from Electronic Access Access c- Responsible Use of d- Responsible and Efficient Use of Limited Resources

14 a- Protecting Resources from Physical Access - You are responsible for the use of your computer account and the activities performed under the current. - You must keep your account secure by preventing others from getting access to your personal computer, desktops, laptops, notebooks, etc. Important: Remember that you are responsible for all or other communications sent from your computer or access port.

15 b- Protecting Resources from Electronic Access You are responsible for protecting your account and its resources from unauthorized electronic access by using effective passwords and by safeguarding those passwords. University Information Technology serves a diverse group of users and are selectively opened to make access and operation easy for users, and the responsibility for protecting the access falls on you – the user. In a nutshell, if something is done in your name then its yours.

16 c- Responsible Use of - Students are encouraged to use electronic mail for university related material and to facilitate the efficient exchange of useful information. - Access and use of mail has certain responsibilities. Users of are expected to be ethical and responsible in their use, following general guidelines (found in the UNS department in the Hill House 3 rd floor room 301) based on common sense, common decency, and civility applied to the networked computing environment.

17 - Messages sent as electronic mail shall meet the same standards for distribution or display as if they were tangible documents. - Identify yourself clearly and accurately in all electronic communications. Concealing or misrepresenting your name or affiliation to dissociate yourself from responsibility for your actions is never appropriate. C- Responsible Use of , contd.

18 - All electronic mail files belong to somebody. They should be assumed to be private and confidential unless the owner has explicitly made them available to others. C-Responsible Use of , contd.

19 d- Responsible and Efficient Use of Limited Resources You are expected to promote and practice efficient use of network resources, consistent with the instructional, research, public service, and administrative goals of the University. Show consideration for others and refrain from engaging in any use that would interfere with their work or disrupt the intended use of network resources. You are expected to promote and practice efficient use of network resources, consistent with the instructional, research, public service, and administrative goals of the University. Show consideration for others and refrain from engaging in any use that would interfere with their work or disrupt the intended use of network resources.

20 III- Can I … …share my computer account? …share my computer account? …give other people an account on my multiuser computer that is connected to the campus network? …give other people an account on my multiuser computer that is connected to the campus network? …tell others about a “Make Money Fast” scheme? …tell others about a “Make Money Fast” scheme? …play a joke on my friend by deleting his/her files? …play a joke on my friend by deleting his/her files? …get even with some jerk by sending him a flood of messages? …get even with some jerk by sending him a flood of messages? … copy some vendors software for my friends? … copy some vendors software for my friends?

21 Can I share my computer account? No. The university provides your computer account for your exclusive use. IT resources should only be used for approved purposes. Don’t give your password to anyone else, even people you trust, such as your friends or relatives or even someone who has offered to help you fix a problem. No. The university provides your computer account for your exclusive use. IT resources should only be used for approved purposes. Don’t give your password to anyone else, even people you trust, such as your friends or relatives or even someone who has offered to help you fix a problem. Assume your user ID is the equivalent of your signature!

22 You are responsible for all charges accrued using the ID number/password or computing resource assigned to you, even if a friend using your password without your permission runs up the charges. You are responsible for all charges accrued using the ID number/password or computing resource assigned to you, even if a friend using your password without your permission runs up the charges. You will also be held responsible for destructive or illegal activity done by someone to whom you gave access. You will also be held responsible for destructive or illegal activity done by someone to whom you gave access. Can I share my computer account ? Contd.

23 Can you give other people an account on my multi-user computer that is connected to the campus network? No. This activity gives those other people access to university computer resources, which is against IT policy. No. This activity gives those other people access to university computer resources, which is against IT policy.

24 Can I tell others about a “Make Money Fast” scheme? No. These are called “chain letters” and are explicitly illegal.

25 Can I play a joke on my friend by deleting his/her files? No. Such activities are illegal, and you are not exempted from the law because you are “just a student” or are underage or it was “my friend” even if you were “just playing around.”

26 Can I get even with some jerk by sending him a flood of messages? No. This is called a “mail bomb” and is inappropriate use of resources. No. This is called a “mail bomb” and is inappropriate use of resources.

27 Can I copy some vendors software for my friends? No. It is a violation of university policy and federal law to participate in copyright infringement. Copyrighted materials include, but are not limited to, computer software, audio and video recordings, photographs, and written material. Violators are subject to University discipline, as well as legal liability, generally – even if the work does not contain a written copyright notice.

28 IV- What can happen? What are the repercussions for violating the rules as listed in section III of Can I…? Punishment for infractions include but is not necessarily limited to: 1- Verbal warnings 2- Revocation of computing privileges 3- Disciplinary probation 4- Suspension and/or expulsion from university 5- Civil liability 6- Criminal prosecution

29 V- What is not against L-A-W OR POLICY? Before you report what you believe is an incident of misuse make sure you are on the right track. First Amendment rights: In general, expressions of opinion by members of the university community that do not violate the law or university rules are protected as “free speech.” We encourage all those associated with the University to exercise their constitutional rights and freedoms responsibility.

30 AUC does not punish its students for expressing views that may be unpopular or offensive, but who break no laws or University rules while doing so. AUC does not punish its students for expressing views that may be unpopular or offensive, but who break no laws or University rules while doing so. V- What is not against L-A-W OR POLICY? Contd.

31 “Spam” Mail “Spam,” unsolicited and unwanted e- mail, and other junk mail from a source outside this university. Many people are annoyed by junk mail such as “spam” and other kinds unsolicited or unwanted . It is not unusual, for junk mail to originate from a source outside the University. In most such cases, the University has little control. In most cases, the University has little control.

32 However, as a recipient you have a great deal of control: 1- You can ignore or delete the junk mail. 2- You can filter your so the offending mail is filed unread in a junk mail file, allowing you to delete it at your leisure. “Spam” Mail contd.

33 Breaches of “Netiquette” Disagreements between people, even heated arguments, unless threatening or otherwise unlawful, are not considered violations. We do however, strongly encourage all users to be polite. A well-known problem with , news- groups, and chat groups is that it’s easy to fire off a quick, angry response that you’ll later wish you hadn’t sent.

34 In doing so, should you cross the line beyond merely being rude or stating an unpopular, offensive view, you may run the risk of violating criminal laws. “Counting to ten” before saying something you may later regret applies in cyberspace too. Breaches of “Netiquette” contd.

35 VI- Reporting an incident? For reporting problems with mail, you may want to notify the University Network Services, Help Desk extensions: 5343,5625, 5624 located at the Hill House Building – 3 rd Floor room 302. Your problem will then be handled either by one of the Help Desk personnel or you will be referred to the appropriate entity.


Download ppt "What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail."

Similar presentations


Ads by Google