RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
What and what not to do..  These devices must remain turned off during the instructional day, including during all testing, unless they are being used.
KEEP It, FILE It, Share It, DELETE It, SHRED It or Archive It What to do with UNCW Records and When to do it Fall 2008 Workshop Eileen Goldgeier / Steve.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Riverside Community School District
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Acceptable Use Policy.  To promote educational excellence in our district by facilitating resource sharing, innovation, and communication for parents,
PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
00870B2F.0/Internet%20Safety.jpg.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Joint Committee of the Higher Education and Entertainment Communities John C. Vaughn Executive Vice President Association of American Universities November.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
Woodland Hills School District Computer Network Acceptable Use Policy.
School Accounts Presented by: Mrs. Mazzola.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Acceptable Use Policy (Draft)
Acceptable Use Policy.
Internet Safety and Acceptable Use Policies.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Student User Agreement and Policy 2022
Woodland Hills School District
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

RESPONSIBLE USE POLICY

UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE PURPOSE Outlines the responsible and appropriate use of the university’s electronic computing and communication resources and services Ensure optimum security and integrity of systems and data.. Ensure the protection of personal identity of faculty, staff and students. Ensure that resources of the university are not utilized to cause harm to any entity or individual. Ensure 100% legality in every aspect of the use of electronic resources at the university. Outlines the responsible and appropriate use of the university’s electronic computing and communication resources and services Ensure optimum security and integrity of systems and data.. Ensure the protection of personal identity of faculty, staff and students. Ensure that resources of the university are not utilized to cause harm to any entity or individual. Ensure 100% legality in every aspect of the use of electronic resources at the university.

UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE KEY POINTS KEY POINTS The University of North Carolina at Wilmington regards as an official method of communication with student, staff and faculty. Accepting any account and/or using university EDPE constitutes agreement on behalf of the user or other individual accessing such information systems to abide and be bound by the provisions Actions that violate the Responsible use Policy (RUP) can result in immediate disabling, suspension, and/or revocation of the account owner's privileges Unauthorized or illegitimate use of EDPE including computer accounts, resources or facilities may subject violators to disciplinary, criminal and/or legal action by the university and/or the State of NC. The University of North Carolina at Wilmington regards as an official method of communication with student, staff and faculty. Accepting any account and/or using university EDPE constitutes agreement on behalf of the user or other individual accessing such information systems to abide and be bound by the provisions Actions that violate the Responsible use Policy (RUP) can result in immediate disabling, suspension, and/or revocation of the account owner's privileges Unauthorized or illegitimate use of EDPE including computer accounts, resources or facilities may subject violators to disciplinary, criminal and/or legal action by the university and/or the State of NC.

UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE A. Harassment, Threats, stalking an similar threats B. Interfering with the Rights of Others and Abuse C. Downloading, or posting to university computers, D. Illegal P2P or Peer-to-Peer file sharing. E. Using university intellectual property (i.e. logos, word marks, or other symbols of the university) F. Creating pages which contain direct links to pages that violate this policy H. Abusing, Damaging, or destroying Electronic Resources, Viruses and Hoaxes I. Accessing or attempting to access, use, or modify resources or data (User Accounts and Authorized Access; Security; Confidentiality and Privacy) J. Engaging in activities that are illegal A. Harassment, Threats, stalking an similar threats B. Interfering with the Rights of Others and Abuse C. Downloading, or posting to university computers, D. Illegal P2P or Peer-to-Peer file sharing. E. Using university intellectual property (i.e. logos, word marks, or other symbols of the university) F. Creating pages which contain direct links to pages that violate this policy H. Abusing, Damaging, or destroying Electronic Resources, Viruses and Hoaxes I. Accessing or attempting to access, use, or modify resources or data (User Accounts and Authorized Access; Security; Confidentiality and Privacy) J. Engaging in activities that are illegal

UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE 1. ITS User Accounts and Authorized Access 2. ITS Security 3. ITS Confidentially 4. ITS Privacy 5. ITS Incidental Personal Use 6. ITS Interfering with the Rights and Activities of Others 7. ITS Harassment, Threats, Stalking, and Similar Activities 8. ITS Abusing, Damaging, or Destroying Electronic Resources 9. ITS Abuse 10. ITS Viruses and Hoaxes 1. ITS User Accounts and Authorized Access 2. ITS Security 3. ITS Confidentially 4. ITS Privacy 5. ITS Incidental Personal Use 6. ITS Interfering with the Rights and Activities of Others 7. ITS Harassment, Threats, Stalking, and Similar Activities 8. ITS Abusing, Damaging, or Destroying Electronic Resources 9. ITS Abuse 10. ITS Viruses and Hoaxes

COPYRIGHT INFRINGEMENT

UNCW Information Security Awareness Program COPYRIGHT INFRINGEMENT Digital Millennium Copyrights Act (DMCA) Motion Picture Association of America (MPAA) Recording Industry Association of America (RIAA) UNCW DMCA References: Illegal P2P Downloading – Morpheus; Kazaa Legal alternative: Illegal P2P Downloading – Morpheus; Kazaa Legal alternative:

Questions