Загрузил Nick Parenyuk

Abuse of Information Technology Resources

реклама
Abuse of Information Technology Resources
What is IT Abuse?
The term "IT abuse" describes willful or negligent unauthorized activity that affects the
availability, confidentiality, or integrity of information technology (IT) resources. In this
context, "IT abuse" can take many forms and may involve any one of a variety of information
technology resources. Prohibited conduct relating to computer access and use for which
students and employees may be subject to disciplinary action are defined in their respective
"standards of conduct."
Some examples of IT abuse include:
The use of obscene or abusive language;
Unauthorized use or misuse of state property or records which includes electronic data and
email;
Willfully or negligently damaging or defacing state records, state property or other persons'
property;
Falsification of records; and
Theft or unauthorized removal of state records, state property or another persons' property
such as a DMCA violation.
Responsible Computing and Information Technology Policies
Everyone within the University of Virginia community has the responsibility to use University
computing and communications technology resources only for legal and ethical activities.
Members of this community must always keep in mind that the intended use of these
resources is to support the University's general mission of instruction, research, and service.
The University Information Security office (InfoSec) has created the documents listed below
to help members of the University community understand the University's expectations.
Responsible Computing: A Handbook for Students
Responsible Computing: A Handbook for Faculty and Staff
The University's Information Technology Policies
Since information technology resources are essential for supporting UVA's mission, it is
important that all users of University IT resources familiarize themselves with and abide by
the documents above, and by all University IT policies. Being a responsible user of these
resources helps to ensure their confidentiality, availability, and integrity and reduces the
likelihood that UVA users will become victims of such abuse.
Consequences of Abuse of IT Resources
Violations of law that occur in the context of computing activities have serious Universitymandated disciplinary consequences. Sanctions involving central University computing and
communications resources for violation of policy or for law are determined by various
disciplinary entities and are carried out by ITS. In the event that an immediate threat to the
computing and communications systems is found, ITS will take direct and immediate action
to safeguard the resources it is charged to protect.
The University Information Security office has a team which responds to reports of IT Abuse.
This group investigates the problems reported and takes appropriate action to protect the
members of the community and University resources. These actions can include blocking a
computer or other device from accessing UVA's network.
Every member of the IT abuse team recognizes the often sensitive nature of both reports
received and what is found during the course of an investigation. All members of the team
hold both reports and findings confidential, consistent with both the letter and the spirit of the
procedures described on these pages and the rules of the disciplinary bodies involved.
Since information technology is an integral part of our lives, IT abuse problems are
prevalent. Being a responsible user of these resources helps prevent these kinds of
problems and minimizes the possibility that you'll be the victim of such abuse.
Скачать