Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Using Information at the University University Secretarys Office
Northside I.S.D. Acceptable Use Policy
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Woodland Hills School District Computer Network Acceptable Use Policy.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Acceptable Use of Computer and Network Resources James L. Wolf Director, Academic Computing Services September 21,2009.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001.
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Health and Safety Legislation
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Class 7 Internet Privacy Law Your Digital Afterlife.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
LPISD Acceptable Use Guidelines La Porte ISD students are fortunate to have access to a wide variety of technology to help make learning more.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Unethical use of Computers and Networks
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
CODES OF CONDUCT IN GAMES DEVELOPMENT. By Nikku (Nick)
SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no SEE-GRID.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Cyber Law Title: COPYRIGHT INFRINGEMENT OF ELECTRONIC COPYING Group Members Amirul Bin Jamil Engku Nadzry Bin Engku Rahmat Mohd Danial Shah Bin Shahzali.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Internet Acceptable Use Policy
Computers Are Your Future Twelfth Edition
Copyright Treasure Hunt
Investigating the correct and legal way to use software
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Computer Programming I
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013

 Computing and network resources are shared resources.  Software, data, and network resources are covered by license agreements and contracts.  Intellectual property rights.  Public agencies operate under state and federal law.  Personal privacy and respect.

 BU Computing and Network Acceptable Use Policy BU Computing and Network Acceptable Use Policy ◦ Approved by University Governance group called ACET ◦ Referenced in Rules of Student Conduct  Student Judiciary  Academic Honesty  University Police

 Use “consistent with the education, research and public service mission”  Users: “those individuals provided a username and password”  “…right to limit access to its networks…” for violations.  “Non-University-owned computers, which house material, which violates the University’s policies, are subject to network disconnection without notice.”

 “Although the University does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or state or federal laws.”

 We don’t monitor content, but there are situations in which we will!!

 Privacy  Copyright Copyright  Harassment, Libel and Slander  Sharing of access  Permitting unauthorized access  Circumventing Security

 Breaching Security ◦ Ultrinsic (requires student to provide id and password to university account)  Unauthorized Monitoring  Flooding  Private Commercial Purposes  Political Advertising or Campaigning  Modifying software or software installation

 Password “does not guarantee privacy”  BU “not responsible for the loss of users’ files or data”  “computer files, including , may be considered “records“”

 Not “personal and private”  “While administrators will not routinely monitor individual and will take reasonable precautions to protect the privacy of , program managers and technical staff may access a student’s ◦ To diagnose and resolve technical problems involving the system, and/or ◦ To investigate possible misuse of when a reasonable suspicion of abuse exists or in conjunction with an approved investigation. “

 Messages sent/received as BU business: ◦ Be considered state records under applicable state regulations; ◦ Be releasable to the public under the Freedom of Information Law; ◦ Require special measures to comply with the Personal Privacy Protection Law  All messages “may be subject to discovery proceedings in legal actions.”

 Be careful before you hit the Send button!!

 immediate suspension of services  student or employee disciplinary procedures  Illegal acts ◦ subpoena and prosecution by commercial enterprises, local, state and/or federal authorities.

 Digital Millenium Copyright Act (1998) ◦ Music, movies, TV shows, games, books, software  Infringement notifications

 Universities should actively discourage sharing of copyrighted material  Universities should provide legal opportunities to obtain music, video content on line ◦ Amazon ◦ iTunes ◦ NetFlix

 Copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.  Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or "statutory" damages affixed at not less than $750 and not more than $30,000 per work infringed. For "willful" infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys' fees. For details, see Title 17, United States Code, Sections 504, 505.  Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.  For more information, please see the website of the U.S. Copyright Office at especially their FAQs at

 Network Performance / Virus infection / Malware infestation  DMCA complaint  Hacking complaint  Harassment complaint  Software piracy complaint

 Identify offender and / or location  Communicate with offender via  Reply acknowledges understanding (first offense)  No reply: place in quarantine  Quarantined offender signs “memo of understanding”  Repeat offender or refuse to sign results in disconnection from Res Hall net and referral to Student Judiciary.

Network Bandwidth Printing

 Current Printing Data Current Printing Data  Cumulative data Cumulative data