Download
acceptable use n.
Skip this Video
Loading SlideShow in 5 Seconds..
Acceptable Use PowerPoint Presentation
Download Presentation
Acceptable Use

Acceptable Use

64 Vues Download Presentation
Télécharger la présentation

Acceptable Use

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Acceptable Use Need It, Hate It; Can’t Agree What It Is (or Isn’t); & There’s No Time to Lose

  2. A Morning’s Email “We were contacted by Darryl Perlin, District Attorney of Santa Barbara County, California. He is in the process of getting a judge's signature on a search warrant for e-mail from the account of one of our students … that was received from or sent to [four outsiders] during the month of November, 1998…”

  3. The Two Towers “…We have received information that an individual has utilized the above-referenced IP address at the noted date and time to offer downloads of the above-mentioned work through a "peer-to-peer" service.... Since you own this IP address, we request that you immediately do the following: 1) Disable access to the individual who has engaged in the conduct described above; and 2) Terminate any and all accounts that this individual has through you....”

  4. May You Be Like Ruth, and Like Esther

  5. Swing Low, Sweet Chariot “The dean of Harvard University's Divinity School was asked to resign his post … after thousands of pornographic images were found on his computer … [S]ources told the Globe that the university's president … had asked [the Dean] to step down after campus computer personnel discovered pornographic images on his university-owned computer… [T]he images were discovered when the dean asked campus computer administrators to … transfer the pornographic files … The Divinity School's computer-use policy forbids the exchange and acquisition of ‘inappropriate, obscene, bigoted, or abusive’ materials.”

  6. Policy… Faculty, students, and staff may use University information technology (which includes privately-owned computers connected to the University network) in connection with the University's core teaching, research, and service missions. Certain non-core uses that do not consume resources or interfere with other users also are acceptable. Under no circumstances may faculty, students, staff, or others use University information technology in ways that are illegal, that threaten the University's tax-exempt or other status, or that interfere with reasonable use by other members of the University community. Violations of information-technology rules and policies typically result in University disciplinary action, which may have serious consequences…

  7. …Scope …Any computer, networking device, telephone, copier, printer, fax machine, or other information technology which is owned by the University or is licensed or leased by the University is subject to University policies. In addition, any information technology which connects directly to the University data or telephone networks, uses University network-dialup facilities (the campus modem pool), connects directly to a computer or other device owned or operated by the University, and/or otherwise uses or affects University information-technology facilities is subject to University information-technology policies, no matter who owns it. Full policy statement: <http://nsit.uchicago.edu/eaup>