A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.

Slides:



Advertisements
Similar presentations
Example policy elements and their role in bandwidth management and optimisation.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Protect Our Students Protect Ourselves
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Woodland Hills School District Computer Network Acceptable Use Policy.
By Stoney Pritchett.  The rules of etiquette that apply when communicating over computer networks, especially the internet.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Acceptable Use By: Keith R. Watson CoC Information Security Manager.
Prepared by: Nahed Al-Salah
Security, Privacy, and Ethics Online Computer Crimes.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Pertemuan 3 Information at Risk Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Electronic Use Policies.   Social Media  Internet.
Corporate Information Systems Delivery of Infrastructure IT Services.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Security and Privacy Strategic Global Partners, LLC.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Small Business Security Keith Slagle April 24, 2007.
Network Security & Accounting
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Security and Ethics Safeguards and Codes of Conduct.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Woodland Hills School District Computer Network Acceptable Use Policy.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Computer Security Sample security policy Dr Alexei Vernitski.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Information Technology Overview Welcome to NC State!
Payment Card Industry (PCI) Rules and Standards
Acceptable Use Policy (Draft)
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
Move this to online module slides 11-56
ONE® Mail Training Presentation
What is Information Security?
Advantages of Networking
Good Spirit School Division
Student User Agreement and Policy 2022
TECHNOLOGY PROTECTION
Woodland Hills School District
BACS Laws And Acts Applications of ICT Communications
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM

LSNYs Process Solicited Participation for All Offices and Job Classifications Reviewed User Policies from Other Legal Services Programs, Other Non-Profits, and Universities Shared the Draft Policy Program Wide for Comment Board Adopted the Policy Solicited Participation for All Offices and Job Classifications Reviewed User Policies from Other Legal Services Programs, Other Non-Profits, and Universities Shared the Draft Policy Program Wide for Comment Board Adopted the Policy

Considerations Workplace Free of Harassment More Secure Technical Environment Protecting Client and Employee Data More Reliable/Consistent Technology Environment Supportive of Staff General Prohibition on Violating Applicable Laws Minimalist Approach Workplace Free of Harassment More Secure Technical Environment Protecting Client and Employee Data More Reliable/Consistent Technology Environment Supportive of Staff General Prohibition on Violating Applicable Laws Minimalist Approach

Internet Use May Use of the Internet for Personal Purposes Follows Our Practice of Non-Computer Resources General Prohibition Against Illegal Activity Reasonable Use - Dont Hog the Bandwidth May Not Install Software Lock Down the Environment Not Big Brother - Deal with usage problems as they affect the network, productivity, or other employees May Use of the Internet for Personal Purposes Follows Our Practice of Non-Computer Resources General Prohibition Against Illegal Activity Reasonable Use - Dont Hog the Bandwidth May Not Install Software Lock Down the Environment Not Big Brother - Deal with usage problems as they affect the network, productivity, or other employees

Similar to the Telephone Big Security and Productivity Risks Getting Users to Think About Security General Prohibited Behavior Outside Issues Retention of Similar to the Telephone Big Security and Productivity Risks Getting Users to Think About Security General Prohibited Behavior Outside Issues Retention of

Steves (in)Sane Approach Open: Don't put more energy into locking down your data than you do in securing your paper files. We really don't have anything that anyone wants anyway. Too much time, energy and expense can be put into security. Caveat: this of course doesn't apply to ports outside your firewall or accessible to the internet. Hackers want your web or server and they shouldn't be allowed to have it to torment others. Standards: It is impossible to support every software application that a staff has an itch to try. pick a uniform set of core apps ( , browser, office suite) and install, support and train only those. Freedom: Program technology should not be controlled by the sys admins. The technology is present for the benefit of staff and their work. We should not lock down our systems to such a degree that staff can't try innovative or time saving ideas. Open: Don't put more energy into locking down your data than you do in securing your paper files. We really don't have anything that anyone wants anyway. Too much time, energy and expense can be put into security. Caveat: this of course doesn't apply to ports outside your firewall or accessible to the internet. Hackers want your web or server and they shouldn't be allowed to have it to torment others. Standards: It is impossible to support every software application that a staff has an itch to try. pick a uniform set of core apps ( , browser, office suite) and install, support and train only those. Freedom: Program technology should not be controlled by the sys admins. The technology is present for the benefit of staff and their work. We should not lock down our systems to such a degree that staff can't try innovative or time saving ideas.

Personal Use of Program Software and Hardware To what extent can staff use the equipment for non work related activity? LSSCM Policy: Employees are permitted reasonable personal use of program equipment provided that: (a) this use occurs on that staff person's personal time; (b) the staff person reimburses the program for any direct costs associated with the use; (c) this use doesn't interfere or conflict with LSSCM's programmatic use of the property, equipment, or system. To what extent can staff use the equipment for non work related activity? LSSCM Policy: Employees are permitted reasonable personal use of program equipment provided that: (a) this use occurs on that staff person's personal time; (b) the staff person reimburses the program for any direct costs associated with the use; (c) this use doesn't interfere or conflict with LSSCM's programmatic use of the property, equipment, or system.

User Responsibilities In addition to prohibitions or limits on acceptable use, there are areas for which your program wants users to take affirmative responsibility. Storage & Back-up Considerations Regular Use of Mail and Voice Mail Virus Protection and Security User Control of Workstations In addition to prohibitions or limits on acceptable use, there are areas for which your program wants users to take affirmative responsibility. Storage & Back-up Considerations Regular Use of Mail and Voice Mail Virus Protection and Security User Control of Workstations

User Responsibilities (cont) Data Storage All staff should place case-related computer documents they work with in the appropriate common directories on the network share. Regular Use of Mail and Voice Mail Staff are responsible for checking and responding to voic and messages regularly. In general, communications through either of these systems should be checked at least daily. If you're not going to receive voic messages for longer than three days, you should leave a message to that effect on your voic . Voic and e- mail communications should be acknowledged and responded to as any other written communication or phone message. Data Storage All staff should place case-related computer documents they work with in the appropriate common directories on the network share. Regular Use of Mail and Voice Mail Staff are responsible for checking and responding to voic and messages regularly. In general, communications through either of these systems should be checked at least daily. If you're not going to receive voic messages for longer than three days, you should leave a message to that effect on your voic . Voic and e- mail communications should be acknowledged and responded to as any other written communication or phone message.

User Responsibilities (cont) Virus Protection and Security Even with the best anti-virus software and security systems users can find ways to make a lot of work for others. Users need to be trained and then asked to take responsibility for their part in prevention. Attachments - some programs prohibit them and provide alternative means for file sharing. Some prohibit opening of a specific type (i.e. exe or pif). Passwords - most prohibit sharing of program passwords outside the program and some have standards for user selection and changing. Transporting Confidential Content on Electronic Media - most apply similar policies as paper case files. Virus Protection and Security Even with the best anti-virus software and security systems users can find ways to make a lot of work for others. Users need to be trained and then asked to take responsibility for their part in prevention. Attachments - some programs prohibit them and provide alternative means for file sharing. Some prohibit opening of a specific type (i.e. exe or pif). Passwords - most prohibit sharing of program passwords outside the program and some have standards for user selection and changing. Transporting Confidential Content on Electronic Media - most apply similar policies as paper case files.

User Responsibilities (cont) Control over User Workstations To what extent will you allow users to install software on their workstations whether for program or personal use? LSSCM Policy: All equipment is owned by LSSCM, therefore - Any material in any LSSCM system may be monitored, copied, or purged by the program management at any time. Seek permission before installing software on your computer. Currently LSSCM does not lock-down desktop computers to prevent software from being installed by individual users. However, users must get permission from both their managing attorney and the program wide CRP before installing additional software on their computer. Control over User Workstations To what extent will you allow users to install software on their workstations whether for program or personal use? LSSCM Policy: All equipment is owned by LSSCM, therefore - Any material in any LSSCM system may be monitored, copied, or purged by the program management at any time. Seek permission before installing software on your computer. Currently LSSCM does not lock-down desktop computers to prevent software from being installed by individual users. However, users must get permission from both their managing attorney and the program wide CRP before installing additional software on their computer.

Policy Resources Sane Technology Policies LSNTAP Training Module – Includes sample policies including LSNY and LSSCM. The Entech NPO Tech Policy Template is a free, online form based system that assists non-profits in creating their own program tech policy. Although it seems a little on the restrictive side.Entech NPO Tech Policy Template Sane Technology Policies LSNTAP Training Module – Includes sample policies including LSNY and LSSCM. The Entech NPO Tech Policy Template is a free, online form based system that assists non-profits in creating their own program tech policy. Although it seems a little on the restrictive side.Entech NPO Tech Policy Template