ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
INTERNET and CODE OF CONDUCT
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
PlanetLab Policies: Learning on the Job Larry Peterson Princeton University.
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Teaching and Learning with Technology Chapter 12 Issues in Implementing Technology in Schools ETEC 562 Spring 2004 Sherri Fetter
University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Woodland Hills School District Computer Network Acceptable Use Policy.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
Computer Security Keeping you and your computer safe in the digital world.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Acceptable Use Policy (Draft)
Chapter 10 Cyberlaw, Social Media, and Privacy
Cell Phones for Learning By Ruth Ann Horn & Chip Jones
Legal and Ethical Issues in E-Commerce
Malware, Phishing and Network Policies
Woodland Hills School District
Presentation transcript:

ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement. CompSci 001 Spring April 2006

What is an ISP? A business or organization that offers users access to the Internet and related services such as Internet transit, domain name registration and hosting, dial-up or DSL access

Should universities be network monitors? "...the University may find it necessary to access and disclose information from computer and network users' accounts to the extent required by law, to uphold contractual obligations or other applicable University policies, or to diagnose and correct technical problems...the ultimate privacy of messages and files cannot be ensured."

CALEA Communications Assistance for Law Enforcement Act Began in 1994 and gave law enforcement right to conduct surveillance over digital telephone networks In March 2004 the Joint Petition for Expedited Rulemaking extended CALEA to cover the Internet as well In August 1995 the First Report and Order extended CALEA to broadband service providers

Digital Millennium Copyright Act Does not readily apply to ISP policy its implications to ISPs are included in the full text Service providers are expected to are expected to remove material from users' web sites that appears to constitute copyright infringement

Duke’s Policy Duke does not restrict the content of material transported across its networks However, they reserve the right to limit access or remove material when applicable There is no argument that monitoring the network limits students abilities to use the internet and communications technologies for research or academic work of any kind

Duke’s Policy (cont’d) The guidelines laid out by the university for acceptable use in no way limit a students ability to access the university network for academic or personal use, so long as that use is legal All users on the network are aware of and must agree to the terms of Duke’s acceptable use policy if they wish to access the network

Duke’s Policy (cont’d) Duke’s network is a privately owned and the university clearly states that they reserve the right to monitor the network Duke, obviously, cannot be expected to provide Internet access to facilitate illegal activities Many universities throughout the country, including UNC- Chapel Hill, have similar acceptable use policies and also reserve the right to monitor their university networks to prevent illegal activities

Duke’s Policy (cont’d) Finally, if, for some reason, acceptable use policies do interfere with research, educational, or service missions, universities have procedures for requesting a written waiver to achieve access to the necessary materials

Limiting of Bandwidth Peer to peer downloading can consume a large amount of bandwidth thus negatively affecting other students on the network and their ability to access the Internet Once installed, these programs operate without the permission or knowledge of the computer user, so you may be using excessive bandwidth without even knowing it. University currently allows 5GB of data to be transmitted to the Internet daily

Limited Bandwidth (cont’d) Straight from L-Mo’s mouth: "The Internet is essential for academic work, social communications and all kinds of daily needs. When we have ample bandwidth available, we don't like seeing anyone short-changed on Internet access. It's a question of fairness. We think we can improve things for the vast majority of students by making changes that are very unlikely to cause problems for anyone."

Compromising Security Peer to peer services are notorious for coming bundled with malware as well as increasing a computer’s vulnerability to malware attacks In many instances P2P services run such harmful, bandwidth consuming without and individual’s knowledge

Economic Cost Two major universities responded to a government investigation concerning monitoring of illegal activity on university networks by saying that as a result of bandwidth limitations and malware they have spent $749,000!!! to fix their networks.

Protection of Student Individuals may be fined upwards of $250,000 and spend five years in prison for copyright infringement Average university response to the discovery of student copyright infringement: a warning or limited access to the university’s network

Protection of Student (cont’d) Which consequence would you rather deal with?