Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Educational Computer Based Training Program CBTCBT.

Similar presentations


Presentation on theme: "An Educational Computer Based Training Program CBTCBT."— Presentation transcript:

1 An Educational Computer Based Training Program CBTCBT

2 Use of State Property Computers: Security and Use Internet Policy The University of Texas at Tyler General Compliance Training

3 U.T. Tyler Compliance Program U.T. Tyler’s Compliance Program is intended to demonstrate the absolute commitment of the University to the highest standards of ethics and compliance with all applicable laws, policies, rules, and regulations. Ethical conduct and compliance are personal responsibilities, and each employee will be held accountable for his or her conduct.

4 Use of State Property General Rule  According to Texas state law, assets owned by U.T. Tyler or any other state entity are to be used for official state purposes only. The personal use of any U.T. asset is prohibited.

5 Use of State Property What’s OK? Q: Is it ever OK to use any U.T. Tyler asset for personal reasons? A: The occasional, incidental use of certain items, such as e-mail and telephones, is OK. But, any use of U.T. resources for personal financial gain is NOT allowed.

6 Computers: Security & Use  What are the Rules?  What do I have to do?  How do I find out more?

7 6 Access a computer network or system without proper authorization. 6 Disclose a password, identification code, debit card or bank account number, or any other confidential information about a computer system without the approval of the system operator. 6 Misuse state property to obtain a benefit or cause harm to another person. Computers: Security & Use What are the Rules? According to Section 33.02 of the Texas Penal Code, state employees, including U.T. Tyler employees, should not:

8 u It is a violation of Texas state law to disclose computer passwords. u Never tell your passwords to anyone, and do not write or display your password in a place visible to others. Computers: Security & Use What about Passwords?

9 u Never disclose or make available to others your computer passwords! u Report any breach of security immediately to your supervisor. u When hired, all U.T. Tyler employees must sign a form that they have received, read, and understand the Information Resources Policy. These forms are all maintained locally by your Information Security Officer, Diane Garrett at ext. 7292. Computers: Security & Use What do I have to do?

10 Computers: Security & Use How do I find out more? u U.T. System Information Resources Use and Security Policy http://www.utsystem.edu/policy/policies/uts165.ht ml http://www.utsystem.edu/policy/policies/uts165.ht ml u U.T. System, Office of the General Counsel on Ethics and the U.T. System http://www.utsystem.edu/ogc/ethics/pubs.htm http://www.utsystem.edu/ogc/ethics/pubs.htm u Section 33.02, Texas Penal Code http://www.depts.ttu.edu/itts/documentation/laws/lpcte xts/state1.html http://www.depts.ttu.edu/itts/documentation/laws/lpcte xts/state1.html

11 u U.T. Tyler’s policies regarding computer security and use. u Ask your supervisor or your institution’s designated compliance director. U.T. Tyler’s Compliance Director is Mary Barr at ext. 7151. Computers: Security & Use How do I find out more? (continued)

12 Internet Policy u What is it? u What can be posted? u Who has access? u What if I need more information?

13 Internet Policy What is it? u U.T. institutions u State agencies & the federal government u Other higher education institutions u Foreign entities u Commercial companies The U.T. System Web-site connects employees to information published by:

14 Internet Policy What can be posted? 4Institutions, and departments within institutions, can publish information on their own sites. 4Examples include general department information, personnel and student directories or listings, and links to related sites.

15 u Only items which support the mission and goals of the U.T. System may be posted to the U.T. Tyler and other institution’s web-sites. u All employees should talk with their department supervisor to determine who is responsible for maintaining the department’s web-site information. Internet Policy What can be posted? (continued)

16 u Only U.T. System Administration departments post information directly to the U.T. System web-site. Departments within institutions post information to their institution’s web-site. u Institutions’ web sites can be reached through links on the U.T. System web-site: www.utsystem.edu www.utsystem.edu Internet Policy What can be posted? (Continued) Clarification:

17 Internet Policy Who has access? But …  Use of the Internet is limited to activities directly related to education, research, institutional, or administrative purposes.  All employees must follow the policies outlined in this training session and available online at http://www.uttyler.edu/it/Policies_Procedures.html http://www.uttyler.edu/it/Policies_Procedures.html

18 Internet Policy What if I need more information? Get more information at: u U.T. System Administration Internet policy http://www.utsystem.edu/policy/policies/int124.ht ml http://www.utsystem.edu/policy/policies/int124.ht ml u U.T. Tyler’s policies regarding Internet use. u Ask your supervisor or your institution’s designated Information Security Officer. U.T. Tyler’s Information Security Officer is Diane Garrett at ext. 7292.

19 U.T. Tyler Disciplinary Procedures u Failure to follow compliance guidelines may result in disciplinary action including: departmental counseling, formal disciplinary action, suspension or termination.

20 Test Your Knowledge Following are several questions to test your knowledge of the information presented. Answer all questions correctly to receive credit for the training.

21 Question #1 TRUE FALSE The use of state-owned items for personal financial gain is allowed if the business is conducted over the telephone.

22 REVIEW

23 Question #2 TRUE FALSE It is a violation of state law to disclose your computer passwords to anyone.

24 REVIEW

25 Question #3 Sign a form stating they have received, read, and understand the U.T. information resources policy All U.T. Tyler employees should... Report any breach of password security immediately to his or her supervisor Both of the above

26 REVIEW

27 Question #4 All U.T. campus institutions All U.T. campus institutions The U.T. System web site does NOT contain links to... Federal & State agencies Federal & State agencies Popular entertainment web sites Popular entertainment web sites

28 REVIEW

29 Question #5 Only information that Only information that supports the mission & supports the mission & goals of U.T. System goals of U.T. System Any information that is Any information that is interesting to the employees interesting to the employees of that department of that department A department of U.T. System Administration can publish on the U.T. System web site...

30 REVIEW

31 Question #6 COMPUTER SECURITY AND USE COMPUTER SECURITY AND USE U.T. SYSTEM INTERNET POLICY U.T. SYSTEM INTERNET POLICY BOTH OF THE ABOVE BOTH OF THE ABOVE During the training, references were provided on where to find and who to contact for information on:

32 REVIEW

33 Congratulations… you have completed your training on Use of State Property Computers: Security & Use Internet Policy The University of Texas at Tyler General Compliance Training

34 Use of State Property Computers: Security & Use Internet Policy Hyperlinks... u U.T. System Policy for the Use & Protection of Information Resources http://www.utsystem.edu/policy/ov/uts165.html http://www.utsystem.edu/policy/ov/uts165.html u OGC Brief Practical Guide on Ethics http://www.utsystem.edu/OGC/ethics/guide.ht m http://www.utsystem.edu/OGC/ethics/guide.ht m u Section 33.02, Texas Penal Code http://tlo2.tlc.state.tx.us/statutes/docs/PE/content/h tm/pe.007.00.000033.00.htm http://tlo2.tlc.state.tx.us/statutes/docs/PE/content/h tm/pe.007.00.000033.00.htm

35 The Training Post An Educational Computer Based Training Program CBTCBT


Download ppt "An Educational Computer Based Training Program CBTCBT."

Similar presentations


Ads by Google