Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Confidentiality & Records Management. What is Information Governance? What is Records Management?
District networked computers give students access to a variety of educational programs, applications programs as well as the Internet. Providing a safe.
IT Security Information Security & Appropriate Use of Information Resources.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Security, Privacy, and Ethics Online Computer Crimes.
Developing a Records & Information Retention & Disposition Program:
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
HIPAA PRIVACY AND SECURITY AWARENESS.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
Student 1-to-1 Netbook Program Care and Use of Computers.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Computer Ethics for Computer Users
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
©Holm Publications Security Awareness Presentation.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
Nashwaaksis Middle School Student Laptop Program Care and Use of Computers.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
The University of Texas at Austin General Compliance Training Program Copyright Property.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Computer Use In Classroom. A: Acceptable U: Usage P: Policy.
Computers Are Your Future Twelfth Edition
HIPAA Privacy & Security
Technology Guidelines for Students
Confidentiality October 14, 2005.
HIPAA Privacy & Security
What is Information Security?
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program

Part 1: Use of U.T. Austin Property General Rules  Assets owned by U.T. Austin are to be used for official state purposes only.  Personal use of any University asset is normally prohibited. (ProCard, long distance telephone card, copy machines, and printers).  Only authorized employees are allowed to drive University vehicles.  Employees may not alter vehicles without U.T.’s permission.

Incidental Use Exception to the rule Q: Is it ever okay to use any U.T. Austin asset for personal reasons?

Incidental Use Exception to the rule Q: Is it ever okay to use any U.T. Austin asset for personal reasons? A: Yes. The occasional, incidental use of certain items, such as , the Internet, and telephones, is okay. Example of an acceptable use of telephone: A school calling in reference to a sick child.

Incidental Use Doesn’t apply to vehicles. Q: I have a need to use a U.T. Austin vehicle regularly. Occasionally I stop at the grocery while using the University’s vehicle. Is this okay?

Incidental Use Doesn’t apply to vehicles. Q: I have a need to use a U.T. Austin vehicle regularly. Occasionally I stop at the grocery while using the University’s vehicle. Is this okay? A: No. University vehicles are to be used for university business purposes only. You may not use a U.T. Austin vehicle to do personal errands.

 What are my responsibilities?  What are the rules and where do I find them?  What about privacy?  What other actions can I take?  How I can find out more? Part 2: Computers Security and Acceptable Use

What are my responsibilities?  Protect IT Resources from Physical and Electronic Access Secure you machine. Log off if you leave your computer. Select a good password. Keep your password secure. Control communications from your computer. Get help at

 Only you can use your resources.  Never reveal your personal password.  You may not generate personal income by using any University-provided computing resource.  Never do anything illegal, threatening, or deliberately destructive  Be considerate. Acceptable Use Policy The Rules

Acceptable Use Policy More Rules  Use resources appropriately.  Never falsify or newsgroup postings.  Be careful of copyright infringement.  Never try to circumvent login procedures.

Acceptable Use Policy Other Rules You should not:  Copy software without specific permission.  Remove computers from campus w/o permission.  Misuse U.T. Austin property to obtain a personal benefit or cause harm to another person. Other rules are found in U.T.’s Policy Memoranda. For more information, see

Copyright Infringement  The University respects copyright protections.  Licensed software may be copied only as permitted by the license.  Employees may not use unauthorized copies.  Any such use is without the consent of U.T.  License agreements vary between software products.

Privacy  Don’t think of your as private.  Systems administrators may see content.  Files may be subject to open records requests.  Employee's privacy might be limited by evidence of fraud harassment, other illegal conduct, or violations of University rules.

 Use virus detection software.  Backup important files and store them in a safe place.  Protect information.  Report any breach of security to U.T.’s information resources immediately.  Sign the U.T. Electronic ID Agreement. Take Action

How do I find out more?  Read Responsible Use of Information Technology at  Read Policy on Computer Security at  Call the ITS Information Security Office at or write  Ask your supervisor, or  Call the Office of Institutional Compliance at

Review Your Knowledge The University of Texas at Austin General Compliance Training Program