Ethics in Internet. Joshi AG Centre for Information and Network Security University of Pune
|
|
- Deborah Dalton
- 8 years ago
- Views:
Transcription
1 Ethics in Internet Joshi AG Centre for Information and Network Security University of Pune
2 The World Today Communication knows no physical boundaries Interconnected globe humming with electronic transmissions a chattering planet nestled in provident silence of space every person everywhere
3 The Internet The Internet has a number of striking features. It is instantaneous, immediate, worldwide, decentralized, interactive, endlessly expandable in contents and outreach, flexible and adaptable to a remarkable degree Anyone with the necessary equipment and modest technical skill can be an active presence in cyberspace
4 Potential Supply information whenever required Way to convey thoughts Sharing knowledge and information Beware it has the potential to harm Can be used in - Business - Research - Communication - Fun and Games Doing illegal, immoral activities
5 Security Concerns in Electronic Environment Availability Confidentiality and Privacy Integrity not while data transfer over public / private media only, but while storage also.
6 Play it SAFE Don t take candy from STRANGERS Don t go where you don t BELONG Those are real PEOPLE out there WHAT you do reflects on you Play by the RULES Don t POLLUTE Do YOUR part
7 Ethics Everyone has his own way Story of Blind Men and Elephant The meaning of "ethics" is hard to pin down
8 Sociologist Raymond Baumhart asked business people "What does ethics mean to you?" Among their replies were the following "Ethics has to do with what my feelings tell me is right or wrong." "Ethics has to do with my religious beliefs." "Being ethical is doing what the law requires." "Ethics consists of the standards of behavior our society accepts." "I don't know what the word means." Contd..
9 Computer Ethics From the 1940s through the 1960s, therefore, there was no discipline known as "computer ethics Walter Maner in the 1970s decided to use the term "computer ethics" in the mid-70s, Walter Maner defined the field as one which examines "ethical problems aggravated, transformed or created by computer technology
10 Contd Wiener in 1950 in his book The Human Use of Human Beings, and Moor also discussed it briefly in "What Is Computer Ethics?" [1985]. According to this alternative account, computer ethics identifies and analyzes the impacts of information technology upon human values like health, wealth, opportunity, freedom, democracy, knowledge, privacy, security, self-fulfillment, and so on
11 Ethics and Internet The technological configuration underlying the Internet has a considerable bearing on its ethical aspects: People have tended to use it according to the way it was designed, and to design it to suit that kind of use Internet is not value free zone. Have sensitivity to social culture
12 Example Topics in Computer Ethics No matter which re-definition of computer ethics one chooses, the best way to understand the nature of the field is through some representative examples of the issues and problems that have attracted research and scholarship. Consider, for example, the following topics: Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility Globalization The Metaethics of Computer Ethics
13 Classes of ethical problems Personal Intrusion Privacy Morality Deception Security Access Intellectual Property Ownership and control Technology and social responsibility
14
15 Scenarios 1. Preeti has walked away from a lab computer without logging off. Hemant sits down and, still logged in as Preeti, sends inflammatory messages out to a number of students and posts similar messages on the class newsgroup A secretary on the campus of a tax-supported university has been requested to give her staff password to her supervisor. The supervisor would like to check the secretarys when she is not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving her password to her supervisor, but is afraid to say no..contd
16 Contd Tina's is being diverted and sent out to her entire class. The messages are quite personal and Tina is very embarrassed Maria figures out that when she is logged into the server she can look at others' directories, make copies of files, and deposit new files. The operating system was designed to allow this functionality so that people could share their work. Mr. Kulkarni objects when he observes Maria poking around in another student's directory. But Maria responds by saying, "If the system allows me to do it and there's no specific rule against it, what's the problem?"
17 ..Contd Smitha had a report to write on acid rain. She used several sources -- books, magazines, newspaper articles, and an electronic encyclopedia. She listed all these sources in her bibliography at the end of the report. She found the encyclopedia to be the most convenient source because she could highlight portions of the text and paste them into her word processing document Joy really enjoys music but doesn't have much money to buy new CDs. He notices that the public library has a lot of CDs and decides to check them out. Once Joy has the CDs at home he realizes that he can burn the CDs and keep copies for himself.
18 Who should act? Government Regulatory Authority Organizations Educators Parents Individuals
19 Standardization and Auditing Need for Standardization E.g HIPAA, ISO 17799, BS7799 Auditing Policy of the organization
20 Association for Computing Machinery (ACM). This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment 1. GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others. Be honest and trustworthy. Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor confidentiality
21 Rfc 1087 Unethical characterized as unethical and unacceptable any activity which purposely: (a) seeks to gain unauthorized access to the resources of the Internet, (b) disrupts the intended use of the Internet, (c) wastes resources (people, capacity, computer) through such actions, (d) destroys the integrity of computer-based information, and/or (e) compromises the privacy of users. Network Working Group Internet Activities Board Request for Comments: 1087 January 1989
22 Users Responsibility That Which is Not Yours Sharing that Which is Yours Protecting that Which is Yours
23 THANK YOU!
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
More informationCUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
More informationSUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
More informationTITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06. REFERENCE: Board Rule 2.16 PAGE 1 OF 6
LAKE-SUMTER COMMUNITY COLLEGE ADMINISTRATIVE PROCEDURE TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO 7-06 REFERENCE: Board Rule 2.16 PAGE 1 OF 6 1. General Information a. LSCC Information Systems (IS)
More informationDIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
More informationBLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationPRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800
PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY
More informationREGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
More informationOdessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
More informationUnited Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
More informationFaculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy
Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized
More informationGUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
More informationAcceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
More informationVentura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
More informationAcceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
More informationInformation Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
More informationUNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
More informationGoogle: Trust, Choice, and Privacy
Google: Trust, Choice, and Privacy Gus Meuli, Caitlin Finn Trust is hard to earn, easy to loose, and nearly impossible to win back. 1 This statement seems to ring true in the constantly changing world
More informationThe Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
More informationPacific Northwest University of Health Sciences
Effective: 7/01/06 Exec. Lead: Chief Business Officer Revised: 1/11 Approved By: Board of Trustees Expired: n/a Applies To: University-wide Pacific Northwest University of Health Sciences Policy: Computer,
More informationOLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
More informationTechnology & Computer Lab Handbook
Technology & Computer Lab Handbook Introduction 1.1 Welcome to! We encourage you to use the computer labs while studying here. The campus technology team is here to provide access to hardware and software
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationHow To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
More informationSubject: Computers & Electronic Records. Responsible Party: Part C Coordinator
POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect
More informationWe will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there
O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction
More informationSussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009
Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC
More informationCODE OF CONDUCT Ethical rules and guidelines
CODE OF CONDUCT Ethical rules and guidelines CONTENT Introduction... 3 Our customers... 5 Employees... 7 The world around us... 9 Communication & dialog... 11 Security, theft & loss... 13 Environment...
More informationLINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
More informationIntellectual Property, Copyright and Fair Use: What Students Should Know
Intellectual Property, Copyright and Fair Use: What Students Should Know UMBC Faculty Development Center March 10, 2004 David McDonald Towson University Please Note: The information provided in this presentation
More informationLutheran Education Association of Houston Acceptable Use Policy (Students)
Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston
More information[MOUNT WACHUSETT COMMUNITY COLLEGE SOCIAL MEDIA GUIDELINES] Updated: 4 February 2011, Prepared by the Marketing & Communications Department
[MOUNT WACHUSETT COMMUNITY COLLEGE SOCIAL MEDIA Updated: 4 February 2011, Prepared by the Marketing & Communications Department Table of Contents Overview of Document.. 2 General Guidelines..... 4 Social
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
More informationComputing and Network Use Policy
Computing and Network Use Policy Category: University Area Date Established: Responsible Office: Office of the Chief Information Officer Date Last Revised: - 3/26/2007 Responsible Executive: CIO Date Posted
More informationABERDARE COMMUNITY SCHOOL. Email Policy. Drafted June 2014 Revised on ... (Chair of Interim Governing Body)
ABERDARE COMMUNITY SCHOOL Email Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) E-MAIL POLICY Review This policy has been approved
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
More informationInformation Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
More information1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
More informationState of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
More informationAT&T s Code of Business Conduct
August 2015 AT&T s Code of Business Conduct To All AT&T Employees Worldwide: The most basic commitment we make to our customers, our shareholders, and each other is to always conduct ourselves in an ethical
More informationGuidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
More informationRiverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
More informationHacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
More informationPolicy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD. Employee use of the District s Computer Systems
Policy 4132/4232 PERSONNEL CERTIFIED/NON-CERTIFIELD Employee use of the District s Computer Systems Computers, computer networks, electronic devices, Internet access, and e-mail are effective and important
More informationMarist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
More informationELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
More informationLegal and Ethical Issues in Computer Security
Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo a i A.Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) Fall 2007 :Objectives for this session
More informationLa Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
More information13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
More informationOur Vendor Code of Conduct
Our Vendor Code of Conduct Jones Lang LaSalle and LaSalle Investment Management Vendor Code of Conduct Copyright Jones Lang LaSalle IP, Inc. Ethics Everywhere Where we stand Jones Lang LaSalle stands for
More informationSUPERIOR NORTH CATHOLIC District School Board ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS
SUPERIOR NORTH CATHOLIC District School Board AR134 ADMINISTRATIVE REGULATION ACCEPTABLE USE OF COMPUTERS & INTERNET/INTRANET TECHNOLOGY BY STUDENTS Students Responsibility Students shall be responsible
More informationHelix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
More informationChapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
More information'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
More informationACCEPTABLE USE OF TECHNOLOGY
IIBE Page 1 ACCEPTABLE USE OF TECHNOLOGY Internet and computer network and non-network access is available to authorized students, teachers, and other staff in the. Albemarle County Public Schools primary
More informationCODE OF BUSINESS CONDUCT
CODE OF BUSINESS CONDUCT POLICY OBJECTIVES 1. This policy constitutes the Code of Business Conduct of companies of the Volga Gas Group (hereinafter called Group companies ). The Code applies to all employees
More informationPOLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)
Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of
More informationC H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY
C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)
More informationMessage from the Co-Chairmen and Chief Executive Officers
Message from the Co-Chairmen and Chief Executive Officers As each of us works to meet individual and Company-wide business goals here at Torchmark, we must all ensure that the work we perform and the business
More informationWarren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines
Warren Consolidated Schools Technology Acceptable Use & Internet Safety Guidelines Scope The acceptable use of information resources, information technology, and networks in the Warren Consolidated Schools
More informationRIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
More informationINFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
More information4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS
4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS Computers, computer networks, Internet access, and e-mail are effective and important technological resources in today's educational environment. The
More informationDATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)
More informationEMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
More information13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationCODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
More informationRedland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
More informationDelaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
More informationR3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS
R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes
More informationSOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
More informationCode - A Date Approved: July 24/01
Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network
More informationb. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.
1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationAnchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
More informationc. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information
Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationPOLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
More informationCis1 Chapter 15 Computer Crime and Ethics
Cis1 Chapter 15 Computer Crime and Ethics 1 Book recommendation: A Gift of Fire Social, Legal, and Ethical Issues in Computing Sara Baase 2 Software Piracy [illegal usage of software] The Industry group
More informationWorking to standard: a code of conduct for support workers in health care. 1.1 Welcome to this code of conduct for support workers in health care.
Code of conduct for Healthcare Support Workers Working to standard: a code of conduct for support workers in health care 1. Introduction 1.1 Welcome to this code of conduct for support workers in health
More informationRiverside School Board
Policy Name: Use of Technology Policy Number: B328-20100216 Date Submitted to Executive: 2009-12-01 Date Received at Council: 2009-12-15 Consultation Period: December 16, 2009 to February 2, 2010 Date
More informationHow To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
More informationSoftware Piracy: What You Should Know
Software Piracy: What You Should Know Whether you call it borrowing, copying, sharing or "fair use," software piracy is illegal and puts Montana Tech's students, faculty and staff, as well as the college
More informationSUNY College at Oneonta Information Technology Acceptable Use Policy
Policy Statement The College s Information Technology resources are intended for the exclusive use of people having a relationship with the College who have been assigned a valid user account. College
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationEthical Guidelines for the Online Researcher
Ethical Guidelines for the Online Researcher The practice of using the internet as a tool for social science research is a comparatively new phenomenon. It is of paramount importance that the researcher
More informationElectronic Communication
Electronic Communication Information Technology Policy Identifier: IT-002 Revision Date: 10/1/2015 Effective Date: 10/18/2012 Approved by: BOR Approved on date: 10/18/2012 Table of Contents 1. Introduction...
More informationCITY OF SALINE CELL PHONE POLICY
CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from
More informationMilgram Activities. Everyone was paid $4.50 and told that they would receive this even if they quit during the study.
Milgram Activities Activity 1 Procedures Aim: To consolidate students knowledge of the procedures of Milgram s study and to encourage co-operative working amongst students. Cut up the following table of
More informationInformation Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D
Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton
More informationNewLead Holdings Ltd. Code of Ethics
NewLead Holdings Ltd. Code of Ethics The Board of Directors of NewLead Holdings Ltd., (the Company ) has adopted this Code of Ethics (the Code ) for all of the Company s employees, directors, officers
More informationTHE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY
THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR
More informationPrivacy and Security Protecting Personal Information Kim Hart and Bill Trott
Privacy and Security Protecting Personal Information Kim Hart and Bill Trott Privacy Video http://www.youtube.com/watch?feature=pla yer_embedded&v=rnjl9eecsoe What is today about? Understand key principles
More informationAcme Consultants Inc.
Sales Aptitude report for: Sally Sample Date taken: Thursday, December 20, 2012 11:42 PM For more information or help reading this report call: 555-234-5678 This report is a tool for the interview process
More informationIntroduction. General Use
Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use
More information