James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
BUSINESS B2 Ethics.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Guide to Network Defense and Countermeasures Second Edition
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Business Plug-In B7 Ethics.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Acceptable Use Policies What you need to know as an elementary school teacher.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Objective 5.02 Understand ethics and ethical decision-making.
Internet Security for Small & Medium Business Week 6
Acceptable Use Policies, Online Safety, and Photo Permission Forms Elizabeth White Tara Dykes Julie Howe.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Computer Security By Duncan Hall.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Developing an Acceptable Use Policy (AUP) EDTC 5325 Dr.Byrum Florence Yang.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Policies and Security for Internet Access
SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no SEE-GRID.
August 31, The Etowah County School District’s electronic network is available to all students and employees. The goal is to foster learning environments.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Developing a Network Security Policy By: Chris Catalano.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Chapter 10 Cyberlaw, Social Media, and Privacy
Chapter # 1 Overview of Ethics
Technology: Legal and Ethical Issues
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
DIGITAL BUSINESS APPLICATIONS
1.00 Understand Ethics And Ethical Decision-making.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Understand ethics and ethical decision-making.
OBSERVE ETHICAL PRACTICES
Objective 5.02 Understand ethics and ethical decision-making.
The Issues with Technology in education
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Understand ethics and ethical decision-making.
Chapter 13: The IT Professional
Privacy Principles Melinda Clarke.
Presentation transcript:

James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies

Concept Map

LaStreichmoors’s Questions 1.What kind of content is required in the AUP for our specific industry? 2.Is an AUP necessary in our industry? 3.What are the repercussions of not having one? 4.How will the implementation of an AUP benefit LaStreichmoor Inc.?

Acceptable Use Policies  Set of rules applied by network and website owners.  Integral to information security.  Restrict the ways in which the network or web-site may be used.  To protect Company's networks and equipment.  To reduce the Unsolicited Commercial " Spam" that is flooding Company's mail server.  To protect Company and its employees from activities that might expose them or Company to legal action.  Example. Example.

Acceptable Use Policies Elements  A preamble  Explains why the policy is needed.  A definition section  Defines key words used in the policy.  A policy statement  Must tell what computer services are covered by the AUP and the circumstances under which employee/customer can use computer services.

Acceptable Use Policies Elements Cont.  An acceptable uses section  Must define appropriate employee/customer use of the computer network.  An unacceptable uses section  the AUP should give clear, specific examples of what constitutes unacceptable employee/customer use.  A violations/sanctions section  should tell employee/customer how to report violations of the policy or whom to question about its application.

Acceptable Use Policies Specific to Banking  Security  Strict security procedures are needed in the storage and disclosure of personal information. When personal information is requested on-line, it should be ensured that the users browser encrypts it.  Cookies  There should be a statement about 'cookies' is information that a website stores on your computer so that it can remember something about you at a later time. Cookies are commonly used on the Internet and do not harm your system.  Application Information  When a user applies for a product or service on the LaStreichmoor’s Bank website, there should be a statement concerning request for personal information that is needed to process your application. The information that is provided should only be used for the purposes described at the time of your application and where applicable in the Terms and Conditions that apply to the relevant product or service.

Acceptable Use Policies Specific to Banking Cont.  Digital Banking  There should be banking instructions concerning the use of secure Digital Banking services, for access to the users account.

About LaStreichmoor Inc. Online banking resource Most of customers in US, but expanding globally Worried about the security of their customers To this point they do not have an AUP Looking to find out if an AUP

Reasons for an AUP in banking? To protect customers To protect themselves Way to control storage of personal information Control employee contact with valuable information Help control application information

AUP Example The Royal Bank of Scotland Protecting customers privacy

Components of RBS AUP Security Ensure browser encrypts personal information “Secure Sockets Layer” Cookies Information a website stores about you Contains cookies that hold no valuable information about you Used in variety of ways Application information Information provided only used for purpose stated Digital banking instructions All information is confidential after you are “logged in” Information used for your instructions only

Is an AUP necessary in banking? Not necessary, but preferred! Banks deal with valuable information Must control use and storage of information Customers feel more comfortable with an AUP To be a trusted bank you need an AUP!

AUP Guidelines A strong AUP gives strict behavioral guidelines within a company for:  Employees  What behavior is allowed, both professionally and in a personal sense  Customers  Whether the company is a safe bet to do business with, and what their stance is on customer security Also gives managers a way of enforcing ethical and behavioral violations

Ramifications of no AUP  No way of enforcing rule or law violations  No real guidelines or ground rules there to follow in the first place  No protection for private, sensitive customer information  Third party or criminal infringement an issue  Responsibility for online behavior is not established Very important issues in banking!

Example: Comcast  Comcast Shuts Down Users Comcast Shuts Down Users  In August of 2007, Comcast began hearing complaints fromcustomers who were unexpectedly being disconnected orsuspended from downloading  Comcast reported that they had a bandwidth limit, andcustomers that continuously exceeded the bandwidth limitwere suspended for up to a year  The company would send a warning to the customer to cutback on the amount of downloading  Unfortunately, the phantom limit was not stated in Comcast’sAUP, leaving them open to lawsuits from customers

LaStreichmoor’s AUP Statement The AUP policy should:  Protect company resources  Limit liability outside of what is expressed in the AUP  Establish a strong code of conduct for customers and employees  Make sure customers are well informed of the best way to ensure their own protection  Take measures to prevent against third party invasion  Be updated consistently to keep up with current standards

Benefits of AUP  Customer Security:  Ensures customer that their cookies will not containconfidential information  Lets the customer know there information will besecure and what methods of encryption will be used  Allows the customer to feel confident whenconducting banking online with company.

Benefits of AUP  Reduce the likelihood of legal liability  Ensures the customers knows the risks involved withonline banking and is forced to accept them as termsof using the service  Makes the customer agree to safe procedures in casethere is a problem with confidentiality

Our Recommendations  LaStreichmoor should implement an AUP  Follow model put forth by other banks  AUP will ease the minds of customers  Will make their bank more trustworthy  Also will help take preventative measures to prevent identity theft  Keep AUP consistently updated

Sources  Policy Policy  world.com/a_curr/curr093.shtml world.com/a_curr/curr093.shtml  services/g3/secure-messaging/aup.ashx services/g3/secure-messaging/aup.ashx