UAF Computing Networking Policies l l l Reasons

  • Slides: 15
Download presentation
UAF Computing & Networking Policies l l l Reasons for policies Who makes &

UAF Computing & Networking Policies l l l Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities for safe computing Your questions & discussion 20 Oct. , 1999 UAF Computing & Networking Policies 1

Rules or common sense responsibility? l Manage university resources for • Reliable access •

Rules or common sense responsibility? l Manage university resources for • Reliable access • Reasonable allocation of resources l Facilitate your work • Communication & collaboration • Safe work environment 20 Oct. , 1999 UAF Computing & Networking Policies 2

External Authorities l Criminal law enforcement • • l Cracking or disrupting networks Use

External Authorities l Criminal law enforcement • • l Cracking or disrupting networks Use for fraud, threats, … Litigation or threat of it Copyright enforcement Use restrictions of funding agencies or network providers 20 Oct. , 1999 UAF Computing & Networking Policies 3

University Authorities Board of Regents Policies l UA System and UAF l Networking and

University Authorities Board of Regents Policies l UA System and UAF l Networking and Computing l Departmental management l 20 Oct. , 1999 UAF Computing & Networking Policies 4

Scope & impact of authorities 20 Oct. , 1999 UAF Computing & Networking Policies

Scope & impact of authorities 20 Oct. , 1999 UAF Computing & Networking Policies 5

What network abuses can disconnect me? l l Disruption of network: equipment, software, or

What network abuses can disconnect me? l l Disruption of network: equipment, software, or intentional Legal requirement Unusual volume degrades others’ use Always attempt voluntary resolution before disconnecting! 20 Oct. , 1999 UAF Computing & Networking Policies 6

What about personal use? l Incidental personal use generally OK, e. g. , -

What about personal use? l Incidental personal use generally OK, e. g. , - personal e-mail, - browse news, - order book l Caveats • no business, political campaigning, or illegal activities! • Cannot represent personal communications as official university • Department may have more restrictive rules 20 Oct. , 1999 UAF Computing & Networking Policies 7

What about pornography? Content-based restrictions generally unsupportable, but l Illegal pornography is illegal! l

What about pornography? Content-based restrictions generally unsupportable, but l Illegal pornography is illegal! l Other pornographic material may still be regarded as harassment or creating a hostile work environment l 20 Oct. , 1999 UAF Computing & Networking Policies 8

Are my e-mail messages or other files private? Your files generally not subject to

Are my e-mail messages or other files private? Your files generally not subject to open records act unless they are indeed the records of official actions. l E-mail and other files on shared systems generally have presumption of privacy but about as secure as a post card! l 20 Oct. , 1999 UAF Computing & Networking Policies 9

“When can techies see my files? ” l Information Resource folks may for valid

“When can techies see my files? ” l Information Resource folks may for valid technical or management reasons • Incidentally as part of normal management of shared resources (e. g. , mis-addressed e-mail) • As needed to diagnose failures l Content remains confidential unless explicitly escalated by senior officer 20 Oct. , 1999 UAF Computing & Networking Policies 10

“When can my boss demand to see files? ” Clearly work-related files (department correspondence

“When can my boss demand to see files? ” Clearly work-related files (department correspondence or budget documents) – at any time. l Where expectation of privacy exists, need a reasonable basis for looking. l 20 Oct. , 1999 UAF Computing & Networking Policies 11

When can the cops see my files? l With a search warrant l Or

When can the cops see my files? l With a search warrant l Or a subpoena 20 Oct. , 1999 UAF Computing & Networking Policies 12

What restrictions are there on “offensive” materials? l A few materials are illegal to

What restrictions are there on “offensive” materials? l A few materials are illegal to send • threats, secrets, illegal pornography l Additional materials might well constitute harassment, hostile work environment, or at least be disruptive & unprofessional • hate speech, intimidation, pornography 20 Oct. , 1999 UAF Computing & Networking Policies 13

What are my responsibilities for safe computing? l Respect rights of others • Civility;

What are my responsibilities for safe computing? l Respect rights of others • Civility; respect for others’ privacy l Common-sense restraint • Work-related use; identify yourself Recognize inherent limits to privacy Back up your work l l 20 Oct. , 1999 UAF Computing & Networking Policies 14

What about encryption? l l Encryption makes messages tamper-proof and unreadable without a key

What about encryption? l l Encryption makes messages tamper-proof and unreadable without a key Good way to protect sensitive material and to guarantee authenticity Need development of a key infrastructure to manage keys PGP available now 20 Oct. , 1999 UAF Computing & Networking Policies 15