UAF Computing Networking Policies l l l Reasons
- Slides: 15
UAF Computing & Networking Policies l l l Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities for safe computing Your questions & discussion 20 Oct. , 1999 UAF Computing & Networking Policies 1
Rules or common sense responsibility? l Manage university resources for • Reliable access • Reasonable allocation of resources l Facilitate your work • Communication & collaboration • Safe work environment 20 Oct. , 1999 UAF Computing & Networking Policies 2
External Authorities l Criminal law enforcement • • l Cracking or disrupting networks Use for fraud, threats, … Litigation or threat of it Copyright enforcement Use restrictions of funding agencies or network providers 20 Oct. , 1999 UAF Computing & Networking Policies 3
University Authorities Board of Regents Policies l UA System and UAF l Networking and Computing l Departmental management l 20 Oct. , 1999 UAF Computing & Networking Policies 4
Scope & impact of authorities 20 Oct. , 1999 UAF Computing & Networking Policies 5
What network abuses can disconnect me? l l Disruption of network: equipment, software, or intentional Legal requirement Unusual volume degrades others’ use Always attempt voluntary resolution before disconnecting! 20 Oct. , 1999 UAF Computing & Networking Policies 6
What about personal use? l Incidental personal use generally OK, e. g. , - personal e-mail, - browse news, - order book l Caveats • no business, political campaigning, or illegal activities! • Cannot represent personal communications as official university • Department may have more restrictive rules 20 Oct. , 1999 UAF Computing & Networking Policies 7
What about pornography? Content-based restrictions generally unsupportable, but l Illegal pornography is illegal! l Other pornographic material may still be regarded as harassment or creating a hostile work environment l 20 Oct. , 1999 UAF Computing & Networking Policies 8
Are my e-mail messages or other files private? Your files generally not subject to open records act unless they are indeed the records of official actions. l E-mail and other files on shared systems generally have presumption of privacy but about as secure as a post card! l 20 Oct. , 1999 UAF Computing & Networking Policies 9
“When can techies see my files? ” l Information Resource folks may for valid technical or management reasons • Incidentally as part of normal management of shared resources (e. g. , mis-addressed e-mail) • As needed to diagnose failures l Content remains confidential unless explicitly escalated by senior officer 20 Oct. , 1999 UAF Computing & Networking Policies 10
“When can my boss demand to see files? ” Clearly work-related files (department correspondence or budget documents) – at any time. l Where expectation of privacy exists, need a reasonable basis for looking. l 20 Oct. , 1999 UAF Computing & Networking Policies 11
When can the cops see my files? l With a search warrant l Or a subpoena 20 Oct. , 1999 UAF Computing & Networking Policies 12
What restrictions are there on “offensive” materials? l A few materials are illegal to send • threats, secrets, illegal pornography l Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional • hate speech, intimidation, pornography 20 Oct. , 1999 UAF Computing & Networking Policies 13
What are my responsibilities for safe computing? l Respect rights of others • Civility; respect for others’ privacy l Common-sense restraint • Work-related use; identify yourself Recognize inherent limits to privacy Back up your work l l 20 Oct. , 1999 UAF Computing & Networking Policies 14
What about encryption? l l Encryption makes messages tamper-proof and unreadable without a key Good way to protect sensitive material and to guarantee authenticity Need development of a key infrastructure to manage keys PGP available now 20 Oct. , 1999 UAF Computing & Networking Policies 15
- Sdn vs traditional networking
- Conventional computing and intelligent computing
- Uaf risk management
- Funciones de la uaf
- üaf
- Ua concur
- Uaf graduate school
- Unified architecture framework example
- Lms uaf
- Uaf admissions office
- Uaf bookstore
- Uaf ehsrm
- Napoleon's domestic policies
- Macroeconomics lesson 2 activity 45
- Accounting principles
- Imperialist presidents