ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES

Similar documents
2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

Acceptable Use Policy ("AUP")

Ecma International Policy on Submission, Inclusion and Licensing of Software

Acceptable Use Policy

Acceptable Use Policy (AUP)

Ecma International Policy on Submission, Inclusion and Licensing of Software

Acceptable Use Policy

Breckenridge Financial Supplies Website Use Policy

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

Acceptable Use and Publishing Policy

: Acceptable Use Policy

NebraskaLink Acceptable Use Policy

IT ACCEPTABLE USE POLICY

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Acceptable Use Policy

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Site Impact Policies for Website Use

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

II.C.4. Policy: Southeastern Technical College Computer Use

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

region16.net Acceptable Use Policy ( AUP )

LET S ENCRYPT SUBSCRIBER AGREEMENT

TERMS OF SERVICE AGREEMENT

The Safe and Sound Services are available for individuals aged 18 years or older.

ORGANIZEFOR PETITION PLATFORM ColorOfChange MOVEMENT-BUILDING PARTNERSHIP PROGRAM TERMS OF SERVICE

MyCreditChain Terms of Use

INCLUDING MEDICAL ADVICE DISCLAIMER

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL

Bloom Broadband Acceptable Use Policy

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Acceptable Use Policy

S E R V E R C E N T R E

Acceptable Use Policy

Funding University Inc. Terms of Service

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)

Sac County Mutual Telephone Company Acceptable Use Policy High Speed Internet Service Page 1 of 5. Sac County Mutual Telephone Company

Tyson Communications Acceptable Use and Network Management Policy

LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³

AhnLab Software License Agreement

ANZ TRANSACTIVE MOBILE for ipad

Guest Wireless Policy

Bar Code Discovery. Administrator's Guide

ASSESSMENT CENTER TERMS AND CONDITIONS. Last Updated 1/21/2011

Agreements & Contracts: Electronic Documents User Agreement CUSTOMER SERVICE SKOWHEGAN SAVINGS

NISUS WEBSOLUTIONS PVT.LTD. Ahmedabad

OHSU s Alumni Relations Program (housed at the OHSU Foundation): 1121 SW Salmon Street, Suite #100 Portland, OR

Acceptable Usage Policy

Open Source Used In Cisco Configuration Professional for Catalyst 1.0

THIS IS A CONTRACT BETWEEN YOU AND VEC (Village Emergency Center).

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION

Keystone Acceptable Use Policy

Terms of Use. Changes. General Use.

JD Edwards World User Reserved Information. Version A9.2

You may contact The Translation Network by at You may also call The Translation Network at

HALCoGen TMS570LS31x Help: example_sci_uart_9600.c

Packet Trace Guide. Packet Trace Guide. Technical Note

Mobile Banking and Mobile Deposit Terms & Conditions

Open Source Used In TSP

This file includes important notes on this product and also the additional information not included in the manuals.

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

NOOTRY TERMS OF SERVICE

RSA Two Factor Authentication

Preface. Audience. Cisco IOS Software Documentation. Organization

OKI DICOM Embedded Printer DICOM Printing Function User's Guide

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy. Effective January 2017

Healthfirst Website Privacy Policy

This file includes important notes on this product and also the additional information not included in the manuals.

User Manual. Date Aug 30, Enertrax DAS Download Client

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010

TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties.

FreedomNet Solutions Acceptable Use Policy ( )

Winnebago Industries, Inc. Privacy Policy

GhostFiber Acceptable Use Policy

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

Copyright PFU LIMITED 2016

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

Remote Deposit Anywhere Service

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

Panasonic Audio Player 2 User Guide

iphone/ipad Connection Manual

Internet Connection Guide

ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE

YOUR USE OF THE SITE OUR INTELLECTUAL PROPERTY RIGHTS

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

Mobile Banking Enrollment Terms & Conditions

*Viola Business Fiber Internet**

Technics Audio Player User Guide

NETCOM.cm Acceptable Use Policy

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com

MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY

MANAGED HOSTING ACCEPTABLE USE POLICY

Transcription:

ACCEPTABLE USE POLICIES FOR INFORMATION SERVICES COMPUTING RESOURCES Information Security Team DePaul University 1 East Jackson Boulevard Chicago, Illinois 60604 US https:/infosec.depaul.edu/ 13th December 2002

Copyright Notice Copyright c 2002. DePaul University. All Rights Reserved. 1. Redistribution of source code, documentation and advisories, must retain the copyright above copyright notice and disclaimer included in Section 4 of this copyright notice. 2. Redistributions in binary forms must reproduce the above copyright notice, this list of conditions, and the disclaimer included in Section 4 of this copyright notice." 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software or information without specific prior written consent. 4. The information contained herein is provided by the regents and contributors AS IS and any express or implied warranties, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the regents or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data or profits; or business interruption) however caused and on any theory or liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this information, even if advised of the possibility of such damage. 2

Contents 1 Summary 4 2 Violations of Acceptable Use 5 2.1 Illegal Use................................ 5 2.2 Harmful Actions Towards Minors................... 5 2.3 Threats or Harassment......................... 5 2.4 Forgery or Impersonation........................ 5 2.5 Fraudulent Activity........................... 5 2.6 Unsolicited Electronic Mail....................... 5 2.7 Unauthorized Access, Threat Assessments, Penetration Tests..... 6 2.8 Intercepting Communications...................... 6 2.9 Copyright or Trademark Infringement................. 6 2.10 Collection of Personal Data....................... 6 2.11 Reselling Services............................ 6 2.12 Network Interruptions.......................... 6 2.13 Physical Security............................ 7 3 Reporting Violations of this Memo 8 3.1 Security Contact............................. 8 3.2 Requested Report Information..................... 8 4 Response Handling 9 3

1 Summary The DePaul University Information Services (IS) division provides an array of technology resources, ranging from Electronic Mail, Web hosting, internetworking connectivity and enterprise resource planning (ERP) business solutions, for use by the University, business peers and anonymous entities including Internet users. This memo is intended to encourage, rather than discourage, the use of these, and other, IS resources by providing guidelines for acceptable use. All use of an IS resource shall constitute an implicit consent of the policies written herein. Violations of these acceptable use guidelines constitute a violation of IS policy requiring proper investigation by University personnel and state or federal law enforcement, where required. 4

2 Violations of Acceptable Use The following actions, incidental, accidental or purposeful, are violations of this memo. 2.1 Illegal Use Using any IS resource to transmit material or data (by email, upload, posting, etc.) that, intentionally or unintentionally, violates any applicable local, state, national, or international law, or express written rules defined per the IS department, violates acceptable use policies found in this memo. 2.2 Harmful Actions Towards Minors Emloying any IS resource to harm, or attempt harm, to any minor or group of minors, or the collection of personal information of a minor, is a violation of this memo. A minor is any person under the age of eighteen (18) years of age. 2.3 Threats or Harassment Transmitting material or data (by email, upload, posting, etc.) that encourages physical or intellectual damage, destruction of property, or harassment shall be considered a violation of this terms set forth within this memo. 2.4 Forgery or Impersonation Falsifying or removing identifying information, in an attempt to deceive or misguide, is prohibited. Impersonation of any other person(s) in this manner constitutes violation of this policy. USENET postings in which email address header information has been altered to prevent targeting of data harvesters is allowed. Nicknames for online chat forums, messaging clients, Web site logins outside of the IS domain, etc. do not violate the terms of this memo. 2.5 Fraudulent Activity Facilitating an IS resource to transmit any material or data (by email, upload, posting, etc.) that promotes a financial scam or wrong doing violate this memo. 2.6 Unsolicited Electronic Mail Transmitting any material in the form of unsolicited electronic mail, unconfirmed email address subscription to mailing lists, or the subscription of email addresses to mailing lists without the ability to un-subscribe, is a violation of the terms within this memo. 5

2.7 Unauthorized Access, Threat Assessments, Penetration Tests Threat assessments, penetration tests and other attempts to audit the integrity of IS resources, or remote network resources outside of IS, by means of port scanning, war dialing, and other hostile means, or unauthorized access to any user accounts, is a direct violation of this memo regardless of the success or harm committed to any resource(s) or data within those resource(s). 2.8 Intercepting Communications The use of packet sniffers, password capture programs, keystroke loggers and other tools that perform promiscuous behavior on any systems maintained by IS, for any reason other than to monitor the data and network traffic authorized to an individual violates this memo. 2.9 Copyright or Trademark Infringement Using any IS resource to transmit any material or data (by email, upload, posting, etc.) that infringes any copyright, patent, trademark, trade secret, or other proprietary right of an entity, whether online or not, violates the terms of this memo. 2.10 Collection of Personal Data The collection of personal data as a means to harvest, analyze, profile or resell this data, without prior express consent from the target audience, violates this memo. 2.11 Reselling Services Reselling services, including dial-up, electronic mail, Web hosting, file storage or processing time, without express written consent of the IS division violates this memo. Additionally, no service(s) provided by IS should be shared, leased, lent or resold at any time. 2.12 Network Interruptions Using any IS resource to allow or promote any activity which adversely affects the ability of to access IS resources, or any other resource, both IS controlled or otherwise, violates this memo. Denial of Service attacks, spoofed packet transmission, and similar actions against, or originating from, any IS resource with malicious, or accidental intent, to cause delay or interruptions in services. In lieu of academic freedom, this violation does not pertain to academic research of such actions in controlled test environments authorized by the University. 6

2.13 Physical Security Unauthorized access to, destruction or alteration of, theft, damage or tampering of any physical IS resource (including network cabling, wireless access points, computer workstations, kiosks, card readers, printers, audio-visual equipment, telephone equipment, FAX machine, computer room equipment or wiring closets) is a violation of the terms of this memo. 7

3 Reporting Violations of this Memo 3.1 Security Contact The DePaul University Information Services department requests that any violations of this memo be reported immediately to the DePaul University Information Security Team (INFOSEC) for further investigation. DePaul University Information Security Team <security@depaul.edu > The use of digital signatures and strong encryption is strongly advised when reporting suspect activity; contact the response team for more information regarding this procedure, or visit the INFOSEC Web site at <https://infosec.depaul.edu > 3.2 Requested Report Information The following information should be included when reporting any misuse of an IS computing resource 1. The date and time, including Universal Coordinated Time (UTC offset), during which the alleged activity occurred. 2. Detailed descriptions of the activity. Where possible, the following information should also be provided to assist in investigations 1. The IP address used to commit any alleged activity. 2. Evidence of alleged activity. 3. Log information regarding the specific attack. 4. Packet traces of suspect network activity. 5. In the event of unsolicited email, an inline, forwarded, message, including all headers, should be included. Attachments will be discarded. 8

4 Response Handling All reports submitted regarding computer or network abuse will be kept confidential by INFOSEC during investigation of the incident. INFOSEC shall advise University officials only in the event that a specific reaction, or increased escalation, is required. 9