Presentation is loading. Please wait.

Presentation is loading. Please wait.

Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.

Similar presentations


Presentation on theme: "Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program."— Presentation transcript:

1 Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program

2 Part 1: Use of U.T. Austin Property General Rules  Assets owned by U.T. Austin are to be used for official state purposes only.  Personal use of any University asset is normally prohibited. (ProCard, long distance telephone card, copy machines, and printers).  Only authorized employees are allowed to drive University vehicles.  Employees may not alter vehicles without U.T.’s permission.

3 Incidental Use Exception to the rule Q: Is it ever okay to use any U.T. Austin asset for personal reasons?

4 Incidental Use Exception to the rule Q: Is it ever okay to use any U.T. Austin asset for personal reasons? A: Yes. The occasional, incidental use of certain items, such as e-mail, the Internet, and telephones, is okay. Example of an acceptable use of telephone: A school calling in reference to a sick child.

5 Incidental Use Doesn’t apply to vehicles. Q: I have a need to use a U.T. Austin vehicle regularly. Occasionally I stop at the grocery while using the University’s vehicle. Is this okay?

6 Incidental Use Doesn’t apply to vehicles. Q: I have a need to use a U.T. Austin vehicle regularly. Occasionally I stop at the grocery while using the University’s vehicle. Is this okay? A: No. University vehicles are to be used for university business purposes only. You may not use a U.T. Austin vehicle to do personal errands.

7  What are my responsibilities?  What are the rules and where do I find them?  What about privacy?  What other actions can I take?  How I can find out more? Part 2: Computers Security and Acceptable Use

8 What are my responsibilities?  Protect IT Resources from Physical and Electronic Access Secure you machine. Log off if you leave your computer. Select a good password. Keep your password secure. Control communications from your computer. Get help at help@cc.utexas.eduhelp@cc.utexas.edu

9  Only you can use your resources.  Never reveal your personal password.  You may not generate personal income by using any University-provided computing resource.  Never do anything illegal, threatening, or deliberately destructive  Be considerate. Acceptable Use Policy The Rules www.utexas.edu/cc/policies/responsible.html

10 Acceptable Use Policy More Rules  Use resources appropriately.  Never falsify e-mail or newsgroup postings.  Be careful of copyright infringement.  Never try to circumvent login procedures.

11 Acceptable Use Policy Other Rules You should not:  Copy software without specific permission.  Remove computers from campus w/o permission.  Misuse U.T. Austin property to obtain a personal benefit or cause harm to another person. Other rules are found in U.T.’s Policy Memoranda. For more information, see http://www.utexas.edu/policies/hoppm/totcm.html http://www.utexas.edu/policies/hoppm/totcm.html

12 Copyright Infringement  The University respects copyright protections.  Licensed software may be copied only as permitted by the license.  Employees may not use unauthorized copies.  Any such use is without the consent of U.T.  License agreements vary between software products.

13 Privacy  Don’t think of your e-mail as private.  Systems administrators may see content.  Files may be subject to open records requests.  Employee's privacy might be limited by evidence of fraud harassment, other illegal conduct, or violations of University rules.

14  Use virus detection software.  Backup important files and store them in a safe place.  Protect information.  Report any breach of security to U.T.’s information resources immediately.  Sign the U.T. Electronic ID Agreement. Take Action

15 How do I find out more?  Read Responsible Use of Information Technology at http://www.utexas.edu/cc/policies/responsible.html http://www.utexas.edu/cc/policies/responsible.html  Read Policy on Computer Security at http://www.utexas.edu/policies/hoppm/pm6302.html#pm6302 http://www.utexas.edu/policies/hoppm/pm6302.html#pm6302  Call the ITS Information Security Office at 475- 9482 or write it@its.utexas.edu, it@its.utexas.edu  Ask your supervisor, or  Call the Office of Institutional Compliance at 232- 7055.

16 Review Your Knowledge The University of Texas at Austin General Compliance Training Program


Download ppt "Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program."

Similar presentations


Ads by Google