Www.see-grid.org SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no. 002356 SEE-GRID.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Bloomfield School District PURCHASING CARD PROGRAM
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
DO-IT TRAINING KIT Acceptable Use Policy
Overview of the Privacy Act
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
Riverside Community School District
Joining the Grid Andrew McNab. 28 March 2006Andrew McNab – Joining the Grid Outline ● LCG – the grid you're joining ● Related projects ● Getting a certificate.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 17 Administrativ e Law.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
VISD Acceptable Use Policy
What is it? A set of rules that restricts the ways in which a network, website or system may be used. New members are usually asked to sign an AUP before.
INTERNET and CODE OF CONDUCT
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
For Students of Humble ISD
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Per Anders Eriksson
LPISD Acceptable Use Guidelines La Porte ISD students are fortunate to have access to a wide variety of technology to help make learning more.
CPS Acceptable Use Policy Day 2 – Technology Session.
HIPAA PRIVACY AND SECURITY AWARENESS.
Computer Legislation The need for computer laws Go to Contents.
Employee Guidelines for Acceptable Use of Technology Resources.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Association with the Gilda Virtual Organization Certificate,VO membership, and MyProxy Server usage.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
FTAA Joint Government-Private Sector Committee of Experts on Electronic Commerce - Feb.15, 2002 Some views on consumer protection in the context of electronic.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
June 6, 2006OSG - Draft VO AUP1 Open Science Grid Trust as a Foundation June 6, 2006 Keith Chadwick.
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid is a Bazaar of Resource Providers and.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Security Bob Cowles
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Nassau Association of School Technologists
Open Science Grid Consortium Meeting
Providing Access to Your Data: Handling sensitive data
Move this to online module slides 11-56
Employee Privacy and Privacy of Employee Information
Student User Agreement and Policy 2022
Presentation transcript:

SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no SEE-GRID AUP Min-Hong Tsai EGEE Project Associate CERN min17502 at gate.sinica.edu.tw

SEE-GRID 5th PSC Meeting – Belgrade March SEEGRID AUP Model Consist of Infrastructure AUP Approved VO AUP Local control over resource use Flexible model to meet user and VO requirements Keep as short as possible Address: Acceptable and unacceptable use Responsibilities Possible consequences

SEE-GRID 5th PSC Meeting – Belgrade March SEE-GRID Infrastructure AUP Users of SEE-GRID infrastructure can only perform work and store data consistent with the objectives of the Virtual Organizations which they are a member of where those Virtual Organizations are authorized to use resources. Users of SEE-GRID infrastructure will not attempt to circumvent controls on authorized use of resources and if Users are informed that some aspect of your grid usage is creating a problem Users must immediately alter your usage to resolve the complaint. Feedback: Do we want to define eligible users here? Location of latest valid version of AUP? Published on VOMS server Or see-grid.org

SEE-GRID 5th PSC Meeting – Belgrade March General Use Users of SEE-GRID VO must: use SEE-GRID resources for only the purpose as described in your approved SEE-GRID application/community registration. SEE-GRID resources are not provided for any other purposes, Feedback: Restriction of personal and commercial use needs to be flexible comply with the evolving AUP of their local computing center and of their NREN.

SEE-GRID 5th PSC Meeting – Belgrade March Security Responsibilities Users shall report to their local security officer any attempt to violate their user account or workstation and, generally, any anomaly that comes to their attention. Users shall report immediately to the issuing Certification Authority and VO Manager any compromise of the private key of their certificates Users shall select safe passwords, endeavor to keep them and the private keys secret and under no circumstances communicate them to third parties. To ensure the proper functioning of the Grid, resource center security officers and computer administrators have the right to access information stored at their site. Such access is limited to professional tasks related to administration and security of the computer systems.

SEE-GRID 5th PSC Meeting – Belgrade March Unacceptable Use Unacceptable Use of the SEE-GRID VO includes, but not limited to: transmitting, distributing or storing of material which is in violation of any applicable law or regulation, violating the privacy or intellectual property rights of others, attempting to obtain unauthorized access to SEE-GRID resources or other systems, attempting to damage or alter without proper authorization either the hardware or software of SEE-GRID or elsewhere.

SEE-GRID 5th PSC Meeting – Belgrade March Enforcement Users shall be liable for damage resulting from any breach of the above regulations and legislation in force at the time. SEE-GRID VO reserves the right, after sending a written notification explaining the nature of the problem or breach of rule observed, to revoke access to Grid resources if a breach concerning the User is under investigation. Feedback: Warning is required. Is notification enough? Legal action against Users may be appropriate in some instances.