Use policies
This presentation is the property of its rightful owner.
Sponsored Links
1 / 15

Use Policies PowerPoint PPT Presentation


  • 83 Views
  • Uploaded on
  • Presentation posted in: General

Use Policies. Deputy Attorney General Robert Morgester [email protected] Use Policy. Communicating the use policy Word of mouth Employee manuals Banners Things that every good use policy should have . . . . The Good Policy.

Download Presentation

Use Policies

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Use policies

Use Policies

Deputy Attorney General Robert Morgester

[email protected]


Use policy

Use Policy

  • Communicating the use policy

    • Word of mouth

    • Employee manuals

    • Banners

  • Things that every good use policy should have . . . .


The good policy

The Good Policy

  • Does the banner state that the use of the network constitutes consent to monitoring?

    • Helps establish consent for

      • Provider monitoring

      • Law enforcement monitoring


The good policy1

The Good Policy

  • Does the banner state that the use of the network constitutes consent to retrieval and disclosure of information stored on the network ?

    • Helps establish consent to the retrieval and disclosure of such information and/or records


The good policy2

The Good Policy

  • Does the banner state that the use of the network constitutes consent to retrieval and disclosure of information stored on the computer ?

    • Helps establish consent to the retrieval and disclosure of such information and/or records


Biby vs univ of nebraska

Biby vs. Univ. of Nebraska

  • Search of employee computer done in response to a civil suit.

  • Employee sued for breach of privacy

  • Court found:

    • No reasonable expectation of privacy because computer use policy indicated computer could be searched when university was responding to discovery

    • Concurring opinion noted that university policy were to some degree private


The good policy3

The Good Policy

  • With government networks, does the banner state that the user of the network shall have no reasonable expectation of privacy in the network ?

    • Helps establish that user lacks a reasonable expectation of privacy pursuant to O’Conner v. Ortega (1987) 480 U.S. 709.

    • And what about that “C” drive?


The good policy4

The Good Policy

  • In the case of non-government network, does the banner make clear that the network system administrator may consent to a law enforcement search?

    • Establishes system administrator’s common authority to consent to a search under United States v. Matlock (1974) 415 U.S. 164.

    • And what about that “C” drive?


The good policy5

The Good Policy

  • Does the banner contain express or implied limitations or authorizations relating to the purpose of any monitoring / search, and what will be done with the fruits of any monitoring / search?

    • Do you want to limit why you can monitor?

    • Where do you want to be able to use the information found?


People v jiang 2002 33 cal rptr 3d 184

People v. Jiang (2002) 33 Cal.Rptr.3d 184

  • Suspect of a sexual assault had his work lap computer produced by court order. Incriminating files were marked “Attorney”

    • Agreement signed by defendant did not preclude personal use of the computer

    • Nor did in mention anything about the company copying or disclosing the contents of the computer


The good policy6

The Good Policy

  • Does the banner state what users are unauthorized to access the network, and the consequences of unauthorized use of he network?

    • Makes it easier to establish unauthorized use?


The good policy7

The Good Policy

  • Does the banner require users to click through or otherwise acknowledge the banner before using the network?

    • Makes it easier to establish the user actually received the notice.


Sample banner

Sample Banner

  • WARNING! This computer system is the property of the United States Department of Justice and may be accessed only by authorized users. Unauthorized use of this system is strictly prohibited and may be subject to criminal prosecution. The Department may monitor any activity or communication on the system and retrieve any information stored within the system. By accessing and using this computer, you are consenting to such monitoring and information retrieval for law enforcement and other purposes. Users should have no expectation of privacy as to any communication on or information stored within the system, including information stored locally on the hard drive or other media in use with this unit (e.g., floppy disks, PDAs and other hand-held peripherals, CD-ROMs, etc.)


More sample banners

More Sample Banners

  • http://cybercrime.gov/s&smanual2002.htm

  • Look for Appendix “A”


Bad use policy

Bad Use Policy?

  • Reasonable investigations into work related misconduct

    • Search must be work related

    • Search must be justified at its inception and permissible in scope

      • Reasonable grounds to believe evidence will be found

      • Search is limited in scope

    • Must be “employer intrusion” rather then “police intrusion”


  • Login