80 likes | 88 Views
Understand the importance of university privacy policies and network monitoring for student safety, legal compliance, and resource protection. Review Duke's and UNC's policies, legal concerns, and current monitoring applications.
E N D
University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel
Universities and the Right to Privacy A university should be allowed to monitor university networks and connected computers for improper activity.
Duke’s Privacy Policy: Neither the University nor its agents restrict the content of material transported across its networks. While the University does not position itself as a censor, it reserves the right to limit access to its networks or to remove material stored or posted on University computers when applicable University policies, contractual obligations, or state or federal laws are violated. Alleged violations will receive the same academic due process as any other alleged violation of University policy, contractual obligations, or state or federal laws. UNC’s Privacy Policy: Wherever possible in a public setting, individuals' privacy should be preserved. However, there is no guarantee of privacy or confidentiality for data stored or for messages stored or sent on University-owned equipment. Persons with questions about the applicability of this Policy to specific situations should contact the Office of University Counsel Violations of University policies governing the use of University electronic resources, including mail services, may result in restriction of access to University information technology resources in addition to any disciplinary action that may be applicable under other University policies, guidelines or implementing procedures, up to and including dismissal. University Privacy Policies
Networks are the University’s Property • The university owns and operates the network and may regulate it however it pleases • By using the network services provided by the University, the students and employees of the University are consenting to act under whatever standards the University sets. • Granted, we are essentially paying for the services. However, just because we pay for the services, it does not mean that we can use it however we please. There are still rules and regulations that must be followed.
Promoting a User-Friendly/Safe Environment • The ability to monitor is essential to having a student body that feels comfortable. • The university should protect everyone who uses the network from viruses and computer-related problems. • The university should be able to investigate other matters that could threaten student safety, like threats of violence or other instances in which the safety of other students comes into question.
Legal Concerns • It is in the best interest of the university to protect itself and its students from getting into trouble with the law. • When students get involved with lawsuits that involve the internet service that is provided by the university, the university is either directly or indirectly involved as well. • lawsuits are costly—Implications: higher tuition costs • lawsuits are bad for the university’s reputation • “Steven Zink, UNR (University of Nevada, Reno)’s vice president of information technology, said the purpose of the policy is to help keep the students and the university out of court for using music-sharing networks like the former Napster.”
Network Monitoring and Privacy Concerns • University network monitoring does not compromise student privacy any more than other sorts of law enforcement currently in effect. • Both router transaction logs and email screenings are done by automated systems or software programs which rarely, if ever, actually look at the content of the web pages visited or messages being received. In addition, no person is actually involved in monitoring.
Current Applications of Monitoring • Bandwidth Monitors • Systems that measure the amount of bandwidth a computer is using and impose restrictions on the heaviest users • Copy Monitors • Software that works inside a router or a gateway to the internet from the network that copies and identifies anything from a FTP or a P2P program • Preemptive Monitors • Monitors that do not judge what is acceptable or unacceptable, but instead prohibit all file sharing operations in its network