We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySuzanna Cummings
Modified about 1 year ago
C HAPTER 3 A CCEPTABLE U SE P OLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge Richard Phillips and Rayton R. Sianjina
A CCEPTABLE U SE P OLICY (AUP) AUPs are written agreements signed by users that state specific rules and regulations for technology use. Outline possible punishments and penalties if technology is used inappropriately (iSAFE, 2011). According to Standler, AUPs have three goals: 1. Educate 2. Provide legal notices 3. Protect the organization (lawsuits and viruses) (Standler, 2002) © Routledge
M AIN C OMPONENTS OF AN AUP The Media Awareness Network (2011) lists the following components of an AUP: An explanation of the availability of computer networks to students and staff members in your school or district A statement about the educational uses and advantages of the Internet An explanation of the responsibilities of educators and parents for students' use of the Internet A code of conduct governing behavior on the Internet An outline of the consequences of violating the AUP (Media Awareness, 2010) © Routledge
M AIN C OMPONENTS OF AN AUP C ONT. A description of what constitutes acceptable and unacceptable use of the Internet A description of the rights of individuals using the networks in the school/district (such as the right to free speech, right to privacy, and so on) A disclaimer absolving the school district from responsibility, under certain circumstances An acknowledgement that the AUP complies with provincial and national telecommunication rules and regulations. (Media Awareness, 2011) © Routledge
I MPORTANT F EATURES OF AN AUP Signature portion (VDOE, 2011) Disclaimer releasing the industry from user wrongdoing (Media Awareness, 2011) Policy enforcement Data collection and alerts (software like eSNIF and VIEW (Fitzer, 2002) Vocabulary and understandable language (Lightspeed Systems, 2011) © Routledge
AUP T EMPLATES Many individuals and industries have developed templates and guidelines to model AUPs. Wentzell states that every AUP should include the following: Philosophies Goals Advantages and disadvantages Statements that tech is a privilege and not a right Definitions and vocabulary Statement of privacy Copyright and netiquette Personal responsibility statement Attorney review © Routledge
A CCEPTABLE U SE P OLICY : L EGAL A SPECTS © R OUTLEDGE C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES
L EGAL I SSUES Acceptable Use Policies are legal binding contracts between users and industries. The user agrees to use the equipment appropriately while the industry agrees to maintain and provide the equipment. However, every AUP is different and is created based on the needs of the industry. Often times when developing Acceptable Use Policies user rights and the rights of the industry conflict. © Routledge
U SER R IGHTS In the United States the Constitution provides certain “unalienable rights” to its citizens. 1 st Amendment — freedom of expression, speech, etc. 4 th Amendment — no unreasonable searches and seizures, right to privacy. 14 th Amendment — Equal Protection Clause, and strengthens due process. (U.S.Const., Amends. I, IV, and XIV) © Routledge
I NDUSTRY R IGHTS Protect the equipment/technology. Establish levels of security. Protect the privacy of employees and users. (iSAFE, 2011) © Routledge
C ONFLICTS When an industry tries to develop an AUP that dilutes the rights of users the dispute is often settled by the U.S. Supreme Court. O’Connor v. Ortega (1987) Private files of a doctor were seized for an investigation. Doctor tried to get the evidence rejected based on 4 th Amendment. Supreme Court ruled that “the operational realities of the workplace may make some public employee’s expectation of privacy unreasonable” (Findlaw, 2011). Allowed industries the freedom to search and was later applied to technology (Smith, Woodsum, & MacMahon, 1999) © Routledge
C ONFLICTS Reno v. ACLU The internet is a public forum and a protected form of speech. Strengthened Tinker v. Des Moines court case that disruptive speech can be banned from schools. Schools can limit speech (public) if it has a reasonable risk of disruption (Tedford and Herbeck, 2006). Urofsky v. Gilmore College professors were accused of accessing pornography on campus, they sued based on 1 st Amendment and privacy violation. Supreme Court ruled that since the college owned the computers then they could punish and search at will. © Routledge
L ARGER C ONTEXT Each of the cases mentioned have one thing in common … an AUP. Rights of the users were diluted due to the protection of the industry and individuals involved. AUPs have to be reviewed by attorneys for the simple fact that the policy and actions of the user could potentially end up in court. Also, an attorney needs to certify that the document is in compliance with federal and state mandates. (Meyer and Johnson, 2011) © Routledge
C ONCLUSION AUP is a series of guidelines that keep both the user and the organization informed about expectations and what actions are acceptable and what are not. It is also important to involve an attorney due to the fact that AUPs are contracts, and like all contracts can be legally binding and can come under scrutiny, especially when they conflict with personal freedoms. © Routledge
CONFIDENTIALITY and SPECIAL EDUCATION SERVICES. What is Confidentiality? Confidentiality is the act of protecting all personally identifiable data, information,
Northside I.S.D. Acceptable Use Policy
BIE SPECIAL EDUCATION ACADEMY PRESENTERS: JUDY WILEY AND NARCY KAWON I ntroduction to Procedural Safeguards Bureau of Indian Education.
E-Rate Changes for 2008 What’s new with e-Rate for experienced coordinators.
312 Test Review 1 Ethics, Privacy, and Freedom of Speech.
The Ethical Use of Computers. What are ethics? The rules of right and wrong behavior. Merriam-Webster defines ethics as the principles of conduct governing.
Department of Commerce Privacy Awareness. August 1, What is privacy protection? Privacy protection includes the protection of the personal privacy.
Rights Re-Write! Re-writing the Bill of Rights. Just to review: What is a Constitution? What is the purpose of the United States Constitution?
CHAPTER 3: “THE U.S. CONSTITUTION”. IDEALS OF THE CONSTITUTION A. Consent of the Governed 1. Popular Sovereignty - consent of the 1. Popular Sovereignty.
Protecting Patient Privacy: HIPAA Guidelines for Health Care Providers.
Best Practices for In House Counsel Andrea C. Okun General Counsel Merit Management Group LP.
Street Law Ch. 05: The Court System. Ch. 01: Kinds of Laws Key Terms Criminal Laws Felonies Misdemeanors Civil Laws Plaintiff Defendant Prosecutor Beyond.
Leon County Schools Teacher Website Guidelines Teachers of the LCS School District are invited to create websites which reflect the professional image.
Beth J. Leahy Esq. Walton Lantaff Schroeder & Carson LLP.
Chapter 18 Vocabulary Civil Liberties Created By: Britany Stergos!
PART 1 United States has a dual system of courts – a federal court system and the court systems of each of the fifty states Under the Articles of Confederation.
1 HIPAA Privacy Standards Health Insurance Portability and Accountability Act – HIPAA Privacy Standards Healthcare Provider Training Module Copyright 2003.
Recipient Rights This course covers the rights guaranteed to all citizens and will give you an understanding on what you can do to promote and protect.
PLANNING THE AUDIT Individual audits must be properly planned to ensure: Appropriate and sufficient evidence is obtained to support the auditors opinion;
HIPAA The New HIPAA Laws Now Have REAL Penalties; Criminal & Civil Legal Information Is Not Legal Advice This site provides information about the law designed.
Legal Issues in Information Security Chapter 5. Objectives Understand U.S. Criminal Law Understand U.S. Criminal Law Understand State Laws Understand.
1 CHAPTER 10. ETHICAL IMPLICATIONS OF INFORMATION TECHNOLOGY Management Information Systems, 9 th edition, By Raymond McLeod, Jr. and George P. Schell.
Arp ISD Acceptable Use Policies Board Approved September, 1998 Updated September, 2000.
1 Gramm-Leach-Bliley Act (GLBA) Implementation of the Safeguards Rule Information Security Program University of Minnesota (Adapted from the Federal Trade.
Manage e-Project Information. Use of the Guide This guide sets out to provide a framework tool to assist e-Project information users. The object of the.
Internet and the Law SPLCs thoughts Libel Libel Q. Is there a different body of libel law that applies just to the Internet? Q. Is there a different body.
CyberCitizenship, CyberSafety & CyberBullying Information, Resources & Curriculum.
Presented By: Last Updated in 01/2014. Equal, fair, and respectful treatment of all clients and beneficiaries Elimination of illegal barriers preventing.
Index District Policiesslide #6slide #6 Schools Deal with Misconductslide #7slide #7 Dear Employeeslide #8slide #8 Training Objectives slide #9slide #9.
Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo’a i A.Tawalbeh Arab Academy for Banking & Financial Sciences.
© 2016 SlidePlayer.com Inc. All rights reserved.