acceptable use
Download
Skip this Video
Download Presentation
Acceptable Use

Loading in 2 Seconds...

play fullscreen
1 / 12

Acceptable Use - PowerPoint PPT Presentation


  • 100 Views
  • Uploaded on

Acceptable Use. By: Keith R. Watson CoC Information Security Manager. What is acceptable use?. Simply – what you are allowed and not allowed to do with Georgia Tech owned resources. This includes: Computers & Networks Telephones, Cell Phones, & Fax Machines

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Acceptable Use' - melvyn


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
acceptable use

Acceptable Use

By: Keith R. Watson

CoC Information Security Manager

what is acceptable use
What is acceptable use?
  • Simply – what you are allowed and not allowed to do with Georgia Tech owned resources.
  • This includes:
    • Computers & Networks
    • Telephones, Cell Phones, & Fax Machines
    • Your Office, Office Furniture, Office Supplies, Credit Cards, & Vehicles
    • Everything owned by Georgia Tech (which in turn is owned by the State of Georgia)

Acceptable Use, by Keith R. Watson

what happens if you don t comply
What happens if you don’t comply?
  • You are subject to disciplinary action up to and including:
    • Being fired
    • Criminal prosecution

Acceptable Use, by Keith R. Watson

what is incidental personal use
What is incidental personal use?
  • We will focus on computer & network use.
  • Personal use that does not prevent GT resources from being used for scholarly and business purposes and meets the following standards:
    • Does not create a security or legal risk for Georgia Tech.
    • Does not interfere with worker productivity.

Acceptable Use, by Keith R. Watson

what is incidental personal use cont
What is incidental personal use? – cont.
  • Does not consume more than a trivial amount of resources that could otherwise be used for scholarly or business purposes.
  • Does not require the installation of any software or hardware unrelated to business or scholarly use.
  • Does not constitute inappropriate behavior for a professional work environment.

Acceptable Use, by Keith R. Watson

examples of inappropriate personal use
Examples of inappropriate personal use
  • This will apply to GT owned laptop and desktop computers.
    • Letting family members and friends use your computer for any reason.
    • Doing your taxes or anyone else\'s taxes.
    • Installing software not related to business operations such as games.
    • Downloading music or videos.
    • Storing your legally owned music or videos.

Acceptable Use, by Keith R. Watson

examples of inappropriate personal use cont
Examples of inappropriate personal use – cont.
  • Email for a business.
  • Viewing inappropriate material.
  • Using your computer for ANY non-GT business purposes regardless of financial gain.
  • This applies to work and home use of GT owned computers and laptops.

Acceptable Use, by Keith R. Watson

examples of appropriate personal use
Examples of appropriate personal use
  • Listening to music or watching video online during breaks or lunch (must not interfere with your work or the work of others).
  • Listening or watching your own music or video stored on your own storage device.
  • Surfing the Internet (provided the material is appropriate, and the sites you visit are not hazardous to your computer).

Acceptable Use, by Keith R. Watson

examples of appropriate personal use cont
Examples of appropriate personal use – cont.
  • Trivial use of GT email such as “don’t forget to pickup milk on the way home”.
  • Checking your non-business related personal web mail (e.g. Gmail, Hotmail, Yahoo! Mail).
  • Checking your non-business related social networking sites (e.g. Facebook, MySpace, Twitter).

Acceptable Use, by Keith R. Watson

appropriate use rules of thumb
Appropriate use rules of thumb
  • Avoid activates that interfere with your work or the work of others.
  • Don’t install any software that is not directly related to GT business use.
  • Don’t store personal files not related to GT business (e.g. music, video, email, taxes, Word or Excel documents).
  • Don’t view material inappropriate for the work place.

Acceptable Use, by Keith R. Watson

appropriate use rules of thumb cont
Appropriate use rules of thumb – cont.
  • Don’t store non-GT related sensitive data.
  • When it doubt – ask (we are not out to get you, we want to help).

Acceptable Use, by Keith R. Watson

resources questions
Resources & Questions
  • Computer & Network Usage and Security Policy
    • http://www.oit.gatech.edu/sites/default/files/CNUSP.pdf
  • Keith R. Watson

CoC Information Security Manager

[email protected]

404-385-7401

  • Questions?

Acceptable Use, by Keith R. Watson

ad