SlideShare a Scribd company logo
1 of 4
Download to read offline
Evaluate the decision to have a computer usage policy and the potential problems associated with
such a policy.
Solution
Georgia Tech’s Computer and Network Usage and Security Policy (CNUSP) provides the
guiding principles for use of Information Technology (IT) Resources at Georgia Tech. It is the
policy of the Institute that its IT resources be used ethically and legally, in accord with applicable
licenses and contracts, and according to their intended use in support of the Institute’s mission.
Faculty, staff, and students are expected to behave in an ethical1 and professional manner when
using IT Resources.
The CNUSP establishes the necessary balance between Georgia Tech’s culture of openness,
trust, and integrity and the appropriate level of security to protect resources. The principles
established are:
Respect for Users
Members of the Georgia Tech community have the responsibility to respect the privacy of
others.
Data Confidentiality and Integrity
Users of Georgia Tech IT resources are responsible for upholding the confidentiality and
integrity of data to which they have access.
Users of Georgia Tech IT resources are responsible for upholding the confidentiality and
integrity of data to which they have access. Users are prohibited from inspecting, copying,
altering, distributing or destroying anyone else’s files or network traffic, including but not
limited to those related to Institute business, research, and teaching, without proper authorization.
Proper authorization may be required not only from the person from whom the data originated,
but also from Institute management or Institute data stewards. If there is a question, users are
encouraged to check with their management before attempting to access the data without
permission.
Users who are authorized to access sensitive data (e.g. student data) are not authorized to
distribute this data to other uses or grant other users access to the same data without permission
from the Data Steward. Permission to access sensitive data may be obtained through Data
Stewards per the Data Access Procedures.
Protection of IT Resources
Georgia Tech users are expected to respect the integrity of Georgia Tech IT resources to which
they have access.
This includes but is not limited to modifying sftware, systems, or networks that are not owned or
managed by the user; accessing systems that you are not authorized to access; knowingly
installing or running malicious or disruptive sftware.
Authorized users have a responsibility to ensure the security and integrity of personally owned or
managed systems, as well as Institute Data accessed through such systems. Unit Technical Leads
have the responsibility to authorize connections to the unit or departmental networks, excluding
LAWN connections. Users may consult with their Technical Leads on security and system
administration issues and responsibilities, although Technical Leads bear no responsibility for
maintaining personally owned systems. Systems connecting to Georgia Tech resources must
adhere to an appropriate set of security requirements, as documented in the Computer and
Network Security Procedures.
Georgia Tech recognizes the value of the research being done in the areas of computer and
network security. During the course of their endeavors, researches may have a need to work with
malicious sftware and with systems that do not adhere to the security standards described above.
Researchers are responsible for their actions and research and must take all necessary
precautions to ensure that their research will not affect other Georgia Tech systems, networks, or
users.
Protection of Sensitive Data
In receiving access to privileged or sensitive data, authorized users accept responsibility to
protect the information accessed and used on their computer.
Protection of Research Data
Researchers are responsible for the safeguarding of data that is created during the course of
research projects.
Remote Access to GT Protected Resources
Georgia Tech users should use a secure method to access protected Georgia Tech resources
remotely.tegrity of Resources and Protection of Data
Respect for Users
Members of the Georgia Tech community have the responsibility to respect the privacy of
others.Users of Georgia Tech resources must not attempt to access data or systems they are not
authorized to access and are expected to respect the integrity of Georgia Tech IT resources.
Data Confidentiality and Integrity
Users of Georgia Tech IT resources are responsible for upholding the confidentiality and
integrity of data to which they have access.
Users of Georgia Tech IT resources are responsible for upholding the confidentiality and
integrity of data to which they have access. Users are prohibited from inspecting, copying,
altering, distributing or destroying anyone else’s files or network traffic, including but not
limited to those related to Institute business, research, and teaching, without proper
authorization.
Proper authorization may be required not only from the person from whom the data originated,
but also from Institute management or Institute data stewards. If there is a question, users are
encouraged to check with their management before attempting to access the data without
permission.
Users who are authorized to access sensitive data (e.g. student data) are not authorized to
distribute this data to other uses or grant other users access to the same data without permission
from the Data Steward. Permission to access sensitive data may be obtained through Data
Stewards per the Data Access Procedures.
Protection of IT Resources
Georgia Tech users are expected to respect the integrity of Georgia Tech IT resources to which
they have access.
This includes but is not limited to modifying sftware, systems, or networks that are not owned or
managed by the user; accessing systems that you are not authorized to access; knowingly
installing or running malicious or disruptive sftware.
Authorized users have a responsibility to ensure the security and integrity of personally owned
or managed systems, as well as Institute Data accessed through such systems. Unit Technical
Leads have the responsibility to authorize connections to the unit or departmental networks,
excluding LAWN connections. Users may consult with their Technical Leads on security and
system administration issues and responsibilities, although Technical Leads bear no
responsibility for maintaining personally owned systems. Systems connecting to Georgia Tech
resources must adhere to an appropriate set of security requirements, as documented in the
Computer and Network Security Procedures.
Georgia Tech recognizes the value of the research being done in the areas of computer and
network security. During the course of their endeavors, researches may have a need to work
with malicious sftware and with systems that do not adhere to the security standards described
above. Researchers are responsible for their actions and research and must take all necessary
precautions to ensure that their research will not affect other Georgia Tech systems, networks,
or users.
Protection of Sensitive Data
In receiving access to privileged or sensitive data, authorized users accept responsibility to
protect the information accessed and used on their computer.Authorized users may have access
to privileged information that must be protected. Employees must take all necessary steps to
prevent unauthorized access to this information. Users may obtain help in protecting their
systems and data from their unit’s IT staff or from OIT.
Protection of Research Data
Researchers are responsible for the safeguarding of data that is created during the course of
research projects.Researchers should review contracts that are in effect for a research project
and make sure that all IT security requirements are being met. In addition, researchers should
make sure that research data is stored in a safe, secure manner so that it may be recovered in the
event of a loss.
Remote Access to GT Protected Resources
Georgia Tech users should use a secure method to access protected Georgia Tech resources
remotely.In the event that a user needs to connect to protected Georgia Tech resources (e.g.
servers with sensitive or research data) using a remote access solution, several safe and secure
options are available from Georgia Tech OIT and Unit IT departments. Additional information
is available in the Georgia Tech Remote Access Policy and Standard. Administrators of Georgia
Tech’s enterprise systems should use the campus VPN service as a secure method to connect to
these resources.

More Related Content

Similar to Evaluate the decision to have a computer usage policy and the potent.pdf

Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
dotco
 
Data management and computer security business manual mainframe (nwrdc) sup...
Data management and computer security business manual   mainframe (nwrdc) sup...Data management and computer security business manual   mainframe (nwrdc) sup...
Data management and computer security business manual mainframe (nwrdc) sup...
Krunal Solanki
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
toltonkendal
 
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfdatabase-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
Dr Amit Phadikar
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
 

Similar to Evaluate the decision to have a computer usage policy and the potent.pdf (20)

Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Data management and computer security business manual mainframe (nwrdc) sup...
Data management and computer security business manual   mainframe (nwrdc) sup...Data management and computer security business manual   mainframe (nwrdc) sup...
Data management and computer security business manual mainframe (nwrdc) sup...
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Database security
Database securityDatabase security
Database security
 
9780840024220 ppt ch01
9780840024220 ppt ch019780840024220 ppt ch01
9780840024220 ppt ch01
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfdatabase-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
Data security
Data securityData security
Data security
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
 
CH01-CompSec4e.pptx
CH01-CompSec4e.pptxCH01-CompSec4e.pptx
CH01-CompSec4e.pptx
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 

More from aroraopticals15

(java) eclipse PleaseDevelop an application that implements a pro.pdf
(java) eclipse PleaseDevelop an application that implements a pro.pdf(java) eclipse PleaseDevelop an application that implements a pro.pdf
(java) eclipse PleaseDevelop an application that implements a pro.pdf
aroraopticals15
 
Write short descriptive answer to the following questions Discuss wh.pdf
Write short descriptive answer to the following questions  Discuss wh.pdfWrite short descriptive answer to the following questions  Discuss wh.pdf
Write short descriptive answer to the following questions Discuss wh.pdf
aroraopticals15
 
Why do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdf
Why do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdfWhy do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdf
Why do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdf
aroraopticals15
 
Which of following is not a class of the phylum platyhelminthes Tre.pdf
Which of following is not a class of the phylum platyhelminthes  Tre.pdfWhich of following is not a class of the phylum platyhelminthes  Tre.pdf
Which of following is not a class of the phylum platyhelminthes Tre.pdf
aroraopticals15
 
what is the process in society that made this change to advertising .pdf
what is the process in society that made this change to advertising .pdfwhat is the process in society that made this change to advertising .pdf
what is the process in society that made this change to advertising .pdf
aroraopticals15
 
Use the following word bank to complete the numbers 51-100. Acoeloma.pdf
Use the following word bank to complete the numbers 51-100.  Acoeloma.pdfUse the following word bank to complete the numbers 51-100.  Acoeloma.pdf
Use the following word bank to complete the numbers 51-100. Acoeloma.pdf
aroraopticals15
 
Todopackage hwk6; This class contains the configuration of a t.pdf
Todopackage hwk6; This class contains the configuration of a t.pdfTodopackage hwk6; This class contains the configuration of a t.pdf
Todopackage hwk6; This class contains the configuration of a t.pdf
aroraopticals15
 

More from aroraopticals15 (20)

For a given H0 and level of significance, if you reject the H0 for a.pdf
For a given H0 and level of significance, if you reject the H0 for a.pdfFor a given H0 and level of significance, if you reject the H0 for a.pdf
For a given H0 and level of significance, if you reject the H0 for a.pdf
 
Find all elements of our ring R that have norm 1. Show that no elemen.pdf
Find all elements of our ring R that have norm 1. Show that no elemen.pdfFind all elements of our ring R that have norm 1. Show that no elemen.pdf
Find all elements of our ring R that have norm 1. Show that no elemen.pdf
 
(java) eclipse PleaseDevelop an application that implements a pro.pdf
(java) eclipse PleaseDevelop an application that implements a pro.pdf(java) eclipse PleaseDevelop an application that implements a pro.pdf
(java) eclipse PleaseDevelop an application that implements a pro.pdf
 
At a sudden contraction in a pipe the diameter changes from D_1 to D_.pdf
At a sudden contraction in a pipe the diameter changes from D_1 to D_.pdfAt a sudden contraction in a pipe the diameter changes from D_1 to D_.pdf
At a sudden contraction in a pipe the diameter changes from D_1 to D_.pdf
 
Above is a trace depicting mechanical activity of frog heart. A stud.pdf
Above is a trace depicting mechanical activity of frog heart. A stud.pdfAbove is a trace depicting mechanical activity of frog heart. A stud.pdf
Above is a trace depicting mechanical activity of frog heart. A stud.pdf
 
A gymnosperm, such as Juniperus virginiana, that produces female con.pdf
A gymnosperm, such as Juniperus virginiana, that produces female con.pdfA gymnosperm, such as Juniperus virginiana, that produces female con.pdf
A gymnosperm, such as Juniperus virginiana, that produces female con.pdf
 
Write short descriptive answer to the following questions Discuss wh.pdf
Write short descriptive answer to the following questions  Discuss wh.pdfWrite short descriptive answer to the following questions  Discuss wh.pdf
Write short descriptive answer to the following questions Discuss wh.pdf
 
Why should anyone else care about what I do with my sewage on my own .pdf
Why should anyone else care about what I do with my sewage on my own .pdfWhy should anyone else care about what I do with my sewage on my own .pdf
Why should anyone else care about what I do with my sewage on my own .pdf
 
Why do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdf
Why do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdfWhy do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdf
Why do viral particles, zymosan on fungi, endotoxin (LPS) from gram .pdf
 
Which of the following used historicalcomparative methods in their .pdf
Which of the following used historicalcomparative methods in their .pdfWhich of the following used historicalcomparative methods in their .pdf
Which of the following used historicalcomparative methods in their .pdf
 
Which of following is not a class of the phylum platyhelminthes Tre.pdf
Which of following is not a class of the phylum platyhelminthes  Tre.pdfWhich of following is not a class of the phylum platyhelminthes  Tre.pdf
Which of following is not a class of the phylum platyhelminthes Tre.pdf
 
What is wrong with this code Please fix.code#include stdio.h.pdf
What is wrong with this code Please fix.code#include stdio.h.pdfWhat is wrong with this code Please fix.code#include stdio.h.pdf
What is wrong with this code Please fix.code#include stdio.h.pdf
 
What are two ways that meiosis could produce gametes that contai.pdf
What are two ways that meiosis could produce gametes that contai.pdfWhat are two ways that meiosis could produce gametes that contai.pdf
What are two ways that meiosis could produce gametes that contai.pdf
 
what is the process in society that made this change to advertising .pdf
what is the process in society that made this change to advertising .pdfwhat is the process in society that made this change to advertising .pdf
what is the process in society that made this change to advertising .pdf
 
What is the best way to go about designing an Android AppSoluti.pdf
What is the best way to go about designing an Android AppSoluti.pdfWhat is the best way to go about designing an Android AppSoluti.pdf
What is the best way to go about designing an Android AppSoluti.pdf
 
Use the following word bank to complete the numbers 51-100. Acoeloma.pdf
Use the following word bank to complete the numbers 51-100.  Acoeloma.pdfUse the following word bank to complete the numbers 51-100.  Acoeloma.pdf
Use the following word bank to complete the numbers 51-100. Acoeloma.pdf
 
Two cards are randomly selected from a 52-card deck. What is the pro.pdf
Two cards are randomly selected from a 52-card deck. What is the pro.pdfTwo cards are randomly selected from a 52-card deck. What is the pro.pdf
Two cards are randomly selected from a 52-card deck. What is the pro.pdf
 
Two labs are being compared to determine if they are providing the sa.pdf
Two labs are being compared to determine if they are providing the sa.pdfTwo labs are being compared to determine if they are providing the sa.pdf
Two labs are being compared to determine if they are providing the sa.pdf
 
Todopackage hwk6; This class contains the configuration of a t.pdf
Todopackage hwk6; This class contains the configuration of a t.pdfTodopackage hwk6; This class contains the configuration of a t.pdf
Todopackage hwk6; This class contains the configuration of a t.pdf
 
This question refers to the ABO blood type locus. Remember that the A.pdf
This question refers to the ABO blood type locus. Remember that the A.pdfThis question refers to the ABO blood type locus. Remember that the A.pdf
This question refers to the ABO blood type locus. Remember that the A.pdf
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 

Evaluate the decision to have a computer usage policy and the potent.pdf

  • 1. Evaluate the decision to have a computer usage policy and the potential problems associated with such a policy. Solution Georgia Tech’s Computer and Network Usage and Security Policy (CNUSP) provides the guiding principles for use of Information Technology (IT) Resources at Georgia Tech. It is the policy of the Institute that its IT resources be used ethically and legally, in accord with applicable licenses and contracts, and according to their intended use in support of the Institute’s mission. Faculty, staff, and students are expected to behave in an ethical1 and professional manner when using IT Resources. The CNUSP establishes the necessary balance between Georgia Tech’s culture of openness, trust, and integrity and the appropriate level of security to protect resources. The principles established are: Respect for Users Members of the Georgia Tech community have the responsibility to respect the privacy of others. Data Confidentiality and Integrity Users of Georgia Tech IT resources are responsible for upholding the confidentiality and integrity of data to which they have access. Users of Georgia Tech IT resources are responsible for upholding the confidentiality and integrity of data to which they have access. Users are prohibited from inspecting, copying, altering, distributing or destroying anyone else’s files or network traffic, including but not limited to those related to Institute business, research, and teaching, without proper authorization. Proper authorization may be required not only from the person from whom the data originated, but also from Institute management or Institute data stewards. If there is a question, users are encouraged to check with their management before attempting to access the data without permission. Users who are authorized to access sensitive data (e.g. student data) are not authorized to distribute this data to other uses or grant other users access to the same data without permission from the Data Steward. Permission to access sensitive data may be obtained through Data Stewards per the Data Access Procedures. Protection of IT Resources Georgia Tech users are expected to respect the integrity of Georgia Tech IT resources to which they have access.
  • 2. This includes but is not limited to modifying sftware, systems, or networks that are not owned or managed by the user; accessing systems that you are not authorized to access; knowingly installing or running malicious or disruptive sftware. Authorized users have a responsibility to ensure the security and integrity of personally owned or managed systems, as well as Institute Data accessed through such systems. Unit Technical Leads have the responsibility to authorize connections to the unit or departmental networks, excluding LAWN connections. Users may consult with their Technical Leads on security and system administration issues and responsibilities, although Technical Leads bear no responsibility for maintaining personally owned systems. Systems connecting to Georgia Tech resources must adhere to an appropriate set of security requirements, as documented in the Computer and Network Security Procedures. Georgia Tech recognizes the value of the research being done in the areas of computer and network security. During the course of their endeavors, researches may have a need to work with malicious sftware and with systems that do not adhere to the security standards described above. Researchers are responsible for their actions and research and must take all necessary precautions to ensure that their research will not affect other Georgia Tech systems, networks, or users. Protection of Sensitive Data In receiving access to privileged or sensitive data, authorized users accept responsibility to protect the information accessed and used on their computer. Protection of Research Data Researchers are responsible for the safeguarding of data that is created during the course of research projects. Remote Access to GT Protected Resources Georgia Tech users should use a secure method to access protected Georgia Tech resources remotely.tegrity of Resources and Protection of Data Respect for Users Members of the Georgia Tech community have the responsibility to respect the privacy of others.Users of Georgia Tech resources must not attempt to access data or systems they are not authorized to access and are expected to respect the integrity of Georgia Tech IT resources. Data Confidentiality and Integrity Users of Georgia Tech IT resources are responsible for upholding the confidentiality and integrity of data to which they have access. Users of Georgia Tech IT resources are responsible for upholding the confidentiality and integrity of data to which they have access. Users are prohibited from inspecting, copying, altering, distributing or destroying anyone else’s files or network traffic, including but not
  • 3. limited to those related to Institute business, research, and teaching, without proper authorization. Proper authorization may be required not only from the person from whom the data originated, but also from Institute management or Institute data stewards. If there is a question, users are encouraged to check with their management before attempting to access the data without permission. Users who are authorized to access sensitive data (e.g. student data) are not authorized to distribute this data to other uses or grant other users access to the same data without permission from the Data Steward. Permission to access sensitive data may be obtained through Data Stewards per the Data Access Procedures. Protection of IT Resources Georgia Tech users are expected to respect the integrity of Georgia Tech IT resources to which they have access. This includes but is not limited to modifying sftware, systems, or networks that are not owned or managed by the user; accessing systems that you are not authorized to access; knowingly installing or running malicious or disruptive sftware. Authorized users have a responsibility to ensure the security and integrity of personally owned or managed systems, as well as Institute Data accessed through such systems. Unit Technical Leads have the responsibility to authorize connections to the unit or departmental networks, excluding LAWN connections. Users may consult with their Technical Leads on security and system administration issues and responsibilities, although Technical Leads bear no responsibility for maintaining personally owned systems. Systems connecting to Georgia Tech resources must adhere to an appropriate set of security requirements, as documented in the Computer and Network Security Procedures. Georgia Tech recognizes the value of the research being done in the areas of computer and network security. During the course of their endeavors, researches may have a need to work with malicious sftware and with systems that do not adhere to the security standards described above. Researchers are responsible for their actions and research and must take all necessary precautions to ensure that their research will not affect other Georgia Tech systems, networks, or users. Protection of Sensitive Data In receiving access to privileged or sensitive data, authorized users accept responsibility to protect the information accessed and used on their computer.Authorized users may have access to privileged information that must be protected. Employees must take all necessary steps to prevent unauthorized access to this information. Users may obtain help in protecting their systems and data from their unit’s IT staff or from OIT.
  • 4. Protection of Research Data Researchers are responsible for the safeguarding of data that is created during the course of research projects.Researchers should review contracts that are in effect for a research project and make sure that all IT security requirements are being met. In addition, researchers should make sure that research data is stored in a safe, secure manner so that it may be recovered in the event of a loss. Remote Access to GT Protected Resources Georgia Tech users should use a secure method to access protected Georgia Tech resources remotely.In the event that a user needs to connect to protected Georgia Tech resources (e.g. servers with sensitive or research data) using a remote access solution, several safe and secure options are available from Georgia Tech OIT and Unit IT departments. Additional information is available in the Georgia Tech Remote Access Policy and Standard. Administrators of Georgia Tech’s enterprise systems should use the campus VPN service as a secure method to connect to these resources.