what are the rules? information technology is available to every student, faculty and staff member...

20
What are the rules? • Information technology is available to every student, faculty and staff member in support of the essential mission of the University. • We are each responsible for protecting these resources. • Being careless with university resources can put your work, your research, your job, even your career at risk.

Upload: jessie-day

Post on 02-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

What are the rules?

• Information technology is available to every student, faculty and staff member in support of the essential mission of the University.

• We are each responsible for protecting these resources.

• Being careless with university resources can put your work, your research, your job, even your career at risk.

Page 2: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

What are the rules?• The Acceptable Use Policy (AUP) contains

official guidelines for the responsible use of information technology resources at the University.

• The AUP describes your rights and responsibilities when using and accessing university resources.

• Acceptable Use Policy: www.utexas.edu/its/policies/aup

Page 3: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

IT Compliance Training

I. Securing your computer

II. Complying with federal copyright law

III. Protecting sensitive data

IV. Safe electronic communications

Page 4: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

I. Securing Your Computer

• Create strong passwords

• Protect your UT EID

• Install security software

• Log off or lock your computer

Page 5: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Strong Passwords• Use a combination of upper and lower case

letters, numbers and symbols.

• Use between 8 to 20 characters.

• Consider using a phrase, such as: “mYdoghA$fLe&s2” .

• Use different passwords for your different accounts—especially your university accounts.

Page 6: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Unsafe Passwords• Your name, birth date, social security number, address or

anything that can personally identify you.

• Any word found in a dictionary, even spelled backwards.

• Words using numbers in place of letters (“mym355ag35” or “mymessages”).

• Keys found next to each other on the keyboard (asdfghjkl).

• Repeating patterns (aaaaaa or 4444).

Page 7: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Password Guidelines

• Don’t give them out or share with anyone.

• Don’t write them down and keep them near your computer.

• Change your passwords regularly – every 6 months or so.

• Don’t enable the “Save Password” option if you are prompted to do so.

Page 8: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Protect your UT EID• Every student, faculty and staff member is

provided with their own UT electronic identification, or EID.

• The UT Electronic ID Agreement.

• Your EID acts as your legal signature on university materials.

Don’t share it!Don’t trade it!Don’t abuse it!

Page 9: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Installing Security Software• Install security software to protect your

computer from:Viruses SpywareSpam

• Update often or set to “auto update”• “BevoWare” provides security software

licensed by the university for your use• Download it at no cost

www.utexas.edu/its/bevoware

Page 10: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Log Off or Lock Up Your Computer

• Log off or lock up your computer when away for any length of time.

• Physically lock up your computer at the end off the day.

• Lock access to your office, lab, or work area to prevent theft.

• It only takes a moment for a thief to steal your computer—and years of your work!

Page 11: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

II. Complying with Federal Copyright Law

• It is against federal law to illegally download copyrighted materials, including:

MusicMoviesSoftware

• It is a violation of university policy to use campus resources to illegally download or otherwise infringe on copyrighted materials.

Page 12: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Complying with Federal Copyright Law

• The university complies with all legal requests regarding copyright infringement.

• Consequences for employees infringing on copyrights can be very serious:

University disciplinary actionLarge monetary finesPrison terms

Page 13: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

III. Protect Sensitive Data

• All data stored on university resources must be classified into one of three categories based on the need to maintain the data’s

ConfidentialityIntegrityAvailability

Page 14: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Category-I Data• Considered restricted and confidential.• Protected by state or federal law.• Never disclose or use Category-I data

without proper authorization.• Includes:

Social security numbers (SSN).Personal information for students,

donors or employees.Business data, such as contract terms

or status.

Page 15: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

• Unauthorized disclosure of Category-I data may result in:

Cancellation of network access.Criminal prosecution.

• Category-I data is protected by directives from: UT System, The State of Texas, and Federal Legislation.

• More information about Category-I is found online at: www.utexas.edu/its/policies

Category-I Data

Page 16: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Category II & III Data

• Category-II Data: data subject to an “open records” request, per the Texas Public Information Act.

• The Texas Public Information Act provides public access to state business and affairs, including work at the University.

• Category-III Data: data not requiring special protection.

Page 17: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

IV. Safe Electronic Communications

• E-mail and instant messages (IM) are not private.

• Never send a message you wouldn’t want to see in the newspaper.

• Never send sensitive information, such as account numbers, credit card numbers, passwords, or SSN, via e-mail or IM.

Page 18: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Safe Electronic Communications• Be suspicious of urgent messages asking for

personal information.

• Delete attachments you aren’t expecting and be cautious if referred to a Web site; viruses and spyware are often spread this way.

• Only IM with people you invite and never click on a link in an instant message.

• If you are unsure, contact the sender off-line. But don’t use the contact information provided.

Page 19: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

IT Compliance Training

Acceptable Use Policy

• www.utexas.edu/its/policies/aup

Information Security Office (ISO)

• 512/475-9242 • [email protected]

Page 20: What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University

Review Your Knowledge

The University of Texas at AustinGeneral Compliance Training Program