20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them...
-
Upload
lucas-morris -
Category
Documents
-
view
214 -
download
0
Transcript of 20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them...
20 Oct., 1999 UAF Computing & Networking Policies
1
UAF Computing & Networking Policies
Reasons for policies Who makes & enforces them Overview of issues based on common
questions Your responsibilities for safe computing Your questions & discussion
20 Oct., 1999 UAF Computing & Networking Policies
2
Rules or common sense responsibility?
Manage university resources for•Reliable access•Reasonable allocation of resources
Facilitate your work•Communication & collaboration•Safe work environment
20 Oct., 1999 UAF Computing & Networking Policies
3
External Authorities
Criminal law enforcement•Cracking or disrupting networks•Use for fraud, threats, …•Litigation or threat of it•Copyright enforcement
Use restrictions of funding agencies or network providers
20 Oct., 1999 UAF Computing & Networking Policies
4
University Authorities
Board of Regents Policies UA System and UAF Networking and Computing Departmental management
20 Oct., 1999 UAF Computing & Networking Policies
5
Scope & impact of authorities
Scope of authority ––––>Federal & StateBoard of Regents& UA System UAF Admin UAF computing& networking Department and/orsupervisor
20 Oct., 1999 UAF Computing & Networking Policies
6
What network abuses can disconnect me?
Disruption of network: equipment, software, or intentional
Legal requirement Unusual volume degrades others’ use Always attempt voluntary resolution
before disconnecting!
20 Oct., 1999 UAF Computing & Networking Policies
7
What about personal use?
Incidental personal use generally OK, e.g., - personal e-mail, - browse news, - order book
Caveats• no business, political campaigning, or illegal
activities!• Cannot represent personal communications as
official university• Department may have more restrictive rules
20 Oct., 1999 UAF Computing & Networking Policies
8
What about pornography?
Content-based restrictions generally unsupportable, but
Illegal pornography is illegal! Other pornographic material
may still be regarded as harassment or creating a hostile work environment
20 Oct., 1999 UAF Computing & Networking Policies
9
Your files generally not subject to open records act unless they are indeed the records of official actions.
E-mail and other files on shared systems generally have presumption of privacy - but about as secure as a post card!
Are my e-mail messages or other files private?
20 Oct., 1999 UAF Computing & Networking Policies
10
“When can techies see my files?”
Information Resource folks may for valid technical or management reasons• Incidentally as part of normal management
of shared resources (e.g., mis-addressed e-mail)
• As needed to diagnose failures Content remains confidential unless
explicitly escalated by senior officer
20 Oct., 1999 UAF Computing & Networking Policies
11
Clearly work-related files (department correspondence or budget documents) – at any time.
Where expectation of privacy exists, need a reasonable basis for looking.
“When can my boss demand to see files?”
20 Oct., 1999 UAF Computing & Networking Policies
12
With a search warrant Or a subpoena
When can the cops see my files?
20 Oct., 1999 UAF Computing & Networking Policies
13
A few materials are illegal to send•threats, secrets, illegal pornography
Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional•hate speech, intimidation, pornography
What restrictions are there on “offensive” materials?
20 Oct., 1999 UAF Computing & Networking Policies
14
What are my responsibilities for safe computing?
Respect rights of others•Civility; respect for others’ privacy
Common-sense restraint •Work-related use; identify yourself
Recognize inherent limits to privacy Back up your work