what is information technology? information technology (it) consists of computers, networks, and the...

35
What is What is Information Information Technology? Technology? Information Technology Information Technology (IT) consists of computers, (IT) consists of computers, networks, and the networks, and the applications they support applications they support such as electronic mail and such as electronic mail and the World Wide Web. These the World Wide Web. These technologies are critical to technologies are critical to the AUC mission, a mission the AUC mission, a mission that includes teaching, that includes teaching, research and public service. research and public service.

Upload: leila-templar

Post on 01-Apr-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

What is Information What is Information Technology?Technology?

Information Technology (IT) Information Technology (IT) consists of computers, networks, consists of computers, networks, and the applications they support and the applications they support such as electronic mail and the such as electronic mail and the World Wide Web. These World Wide Web. These technologies are critical to the AUC technologies are critical to the AUC mission, a mission that includes mission, a mission that includes teaching, research and public teaching, research and public service.service.

Page 2: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

What is IT contd.What is IT contd.

IT increases communication IT increases communication opportunities and affects the way we opportunities and affects the way we conduct business as a university in the conduct business as a university in the following:following:

Page 3: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Examples of how IT is Examples of how IT is connectedconnected

All students, faculty, and staff may have All students, faculty, and staff may have an e-mail account.an e-mail account.

All members of AUC may obtain computer All members of AUC may obtain computer user privileges.user privileges.

Students frequently submit assignments Students frequently submit assignments using e-mail.using e-mail.

Committee reports or presentations may Committee reports or presentations may appear in Web form only.appear in Web form only.

Communication is increasingly done Communication is increasingly done through the e-mail system.through the e-mail system.

Page 4: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

While information technology helps While information technology helps us function, it also requires us function, it also requires responsible use from each user. responsible use from each user.

Your actions on this campus can Your actions on this campus can affect people throughout the world. affect people throughout the world.

These technologies require These technologies require responsible use with respect for responsible use with respect for others.others.

Responsibilities in IT.Responsibilities in IT.

Page 5: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Information technology is provided to Information technology is provided to support the essential mission of AUC support the essential mission of AUC campus. campus.

Your use of information technology is Your use of information technology is governed by campus policies, and governed by campus policies, and regulations. If an action is against regulations. If an action is against the law it is against campus Policy – the law it is against campus Policy – whether specifically spelled out or whether specifically spelled out or not!not!

Responsibilities of IT Responsibilities of IT contd.contd.

Page 6: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

You are requested to use You are requested to use information technology information technology with courtesy, respect and with courtesy, respect and integrity.integrity.

Responsibilities of IT contd.Responsibilities of IT contd.

Page 7: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Things to expectThings to expectAs a user of ITS at this facility and in As a user of ITS at this facility and in

AUC, there are certain things you can AUC, there are certain things you can expect:expect:

I- What can I expect?I- What can I expect?

II- What are my responsibilities?II- What are my responsibilities?

III- Can I …...III- Can I …...

IV- What can happen?IV- What can happen?

V- What is not against L-A-W V- What is not against L-A-W OROR POLICY? POLICY?

VI- Reporting an incident?VI- Reporting an incident?

Page 8: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

I- What can I expect?I- What can I expect? Is my e-mail private?Is my e-mail private? Are my files private?Are my files private? What are my First Amendment What are my First Amendment

rights?rights? What can I do about being What can I do about being

harassed?harassed? What happens if someone What happens if someone

complains about me?complains about me?

Page 9: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

E-mail stored on University-operated mail E-mail stored on University-operated mail servers requires a password for access servers requires a password for access and is therefore protected on the mail and is therefore protected on the mail server, based upon the security strength server, based upon the security strength of that password.of that password.

E-mail is thought of as a postcard, where E-mail is thought of as a postcard, where privacy is supposed to be observed, but in privacy is supposed to be observed, but in cases when needed to remedy problems cases when needed to remedy problems with an e-mail system, the systems with an e-mail system, the systems administrators may become aware of the administrators may become aware of the contents of some messages.contents of some messages.

Is my e-mail private?Is my e-mail private?

Page 10: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

The university respects the contents The university respects the contents of your files and does not review file of your files and does not review file content. However, system content. However, system administrators may become aware of administrators may become aware of the content while dealing with some the content while dealing with some system problems.system problems.

Are my files private?Are my files private?

Page 11: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

As an Academic institution, we place As an Academic institution, we place great value on freedom of thought and great value on freedom of thought and expression.expression.

All students associated with the All students associated with the university should exercise their university should exercise their freedoms in a mature, responsible, freedoms in a mature, responsible, and respectful mannerand respectful manner

What are my First What are my First Amendment rights?Amendment rights?

Page 12: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Unfortunately, rudeness is not Unfortunately, rudeness is not harassment and neither are other harassment and neither are other boorish behaviors. If you feel you boorish behaviors. If you feel you are harassed, it should be reported are harassed, it should be reported to the Dean for Student Affairsto the Dean for Student Affairs

What can I do about What can I do about being harassed?being harassed?

Page 13: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

II- What are my II- What are my responsibilities?responsibilities?

a- Protecting Resources from Physical a- Protecting Resources from Physical AccessAccess

b- Protecting Resources from Electronic b- Protecting Resources from Electronic

AccessAccess

c- Responsible Use of E-mailc- Responsible Use of E-mail

d- Responsible and Efficient Use of d- Responsible and Efficient Use of Limited ResourcesLimited Resources

Page 14: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

a- Protecting Resources a- Protecting Resources from Physical Accessfrom Physical Access

- You are responsible for the use of your You are responsible for the use of your computer account and the activities computer account and the activities performed under the current.performed under the current.

- You must keep your account secure by You must keep your account secure by preventing others from getting access to preventing others from getting access to your personal computer, desktops, your personal computer, desktops, laptops, notebooks, etc.laptops, notebooks, etc.

Important:Important: Remember that you are Remember that you are responsible for all e-mail or other responsible for all e-mail or other communications sent from your communications sent from your computer or access port.computer or access port.

Page 15: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

b- Protecting Resources from b- Protecting Resources from Electronic AccessElectronic Access

You are responsible for protecting your You are responsible for protecting your account and its resources from account and its resources from unauthorized electronic access by using unauthorized electronic access by using effective passwords and by safeguarding effective passwords and by safeguarding those passwords. University Information those passwords. University Information Technology serves a diverse group of users Technology serves a diverse group of users and are selectively opened to make access and are selectively opened to make access and operation easy for users, and the and operation easy for users, and the responsibility for protecting the access falls responsibility for protecting the access falls on on you – the useryou – the user.. In a nutshell, if In a nutshell, if something is done in your name then something is done in your name then its its yoursyours..

Page 16: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

c- Responsible Use ofc- Responsible Use of E-mail E-mail

- Students are encouraged to use electronic mail for Students are encouraged to use electronic mail for university related material and to facilitate the university related material and to facilitate the efficient exchange of useful information.efficient exchange of useful information.

- Access and use of mail has certain responsibilities. Access and use of mail has certain responsibilities. Users of e-mail are expected to be ethical and Users of e-mail are expected to be ethical and responsible in their use, following general responsible in their use, following general guidelines (found in the UNS department in the Hill guidelines (found in the UNS department in the Hill House 3House 3rdrd floor room 301) based on common sense, floor room 301) based on common sense, common decency, and civility applied to the common decency, and civility applied to the networked computing environment.networked computing environment.

Page 17: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

- Messages sent as electronic mail shall Messages sent as electronic mail shall meet the same standards for distribution meet the same standards for distribution or display as if they were tangible or display as if they were tangible documents.documents.

- Identify yourself clearly and accurately in Identify yourself clearly and accurately in all electronic communications. Concealing all electronic communications. Concealing or misrepresenting your name or affiliation or misrepresenting your name or affiliation to dissociate yourself from responsibility to dissociate yourself from responsibility for your actions is never appropriate.for your actions is never appropriate.

C- Responsible Use of E-mail, C- Responsible Use of E-mail, contd.contd.

Page 18: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

- All electronic mail files belong to All electronic mail files belong to somebody. They should be assumed somebody. They should be assumed to be private and confidential unless to be private and confidential unless the owner has explicitly made them the owner has explicitly made them available to others.available to others.

C-Responsible Use of E-mail, C-Responsible Use of E-mail, contd.contd.

Page 19: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

d- Responsible and Efficient Use d- Responsible and Efficient Use of Limited Resourcesof Limited Resources

You are expected to promote and You are expected to promote and practice efficient use of network practice efficient use of network resources, consistent with the resources, consistent with the instructional, research, public instructional, research, public service, and administrative goals of service, and administrative goals of the University. Show consideration the University. Show consideration for others and refrain from engaging for others and refrain from engaging in any use that would interfere with in any use that would interfere with their work or disrupt the intended their work or disrupt the intended use of network resources.use of network resources.

Page 20: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

III- Can I …III- Can I … ……share my computer account?share my computer account? ……give other people an account on my give other people an account on my

multiuser computer that is connected to multiuser computer that is connected to the campus network?the campus network?

……tell others about a “Make Money Fast” tell others about a “Make Money Fast” scheme?scheme?

……play a joke on my friend by deleting play a joke on my friend by deleting his/her files?his/her files?

……get even with some jerk by sending him get even with some jerk by sending him a flood of e-mail messages?a flood of e-mail messages?

… … copy some vendors software for my copy some vendors software for my friends?friends?

Page 21: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Can I share my computer Can I share my computer account?account?

No. The university provides your No. The university provides your computer account for your exclusive computer account for your exclusive use. IT resources should only be use. IT resources should only be used for approved purposes. Don’t used for approved purposes. Don’t give your password to anyone else, give your password to anyone else, even people you trust, such as your even people you trust, such as your friends or relatives or even someone friends or relatives or even someone who has offered to help you fix a who has offered to help you fix a problem.problem.

Assume your user ID is the Assume your user ID is the equivalent of your signature!equivalent of your signature!

Page 22: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

You are responsible for all charges You are responsible for all charges accrued using the ID number/password accrued using the ID number/password or computing resource assigned to you, or computing resource assigned to you, even if a friend using your password even if a friend using your password without your permission runs up the without your permission runs up the charges.charges.

You will also be held responsible for You will also be held responsible for destructive or illegal activity done by destructive or illegal activity done by someone to whom you gave access.someone to whom you gave access.

Can I share my computer Can I share my computer account ? Contd.account ? Contd.

Page 23: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Can you give other people an Can you give other people an account on my multi-user computer account on my multi-user computer that is connected to the campus that is connected to the campus network?network?

No.No. This activity gives those other This activity gives those other people access to university computer people access to university computer resources, which is against IT policy.resources, which is against IT policy.

Page 24: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Can I tell others about a Can I tell others about a “Make Money Fast” scheme?“Make Money Fast” scheme?

No.No. These are called These are called “chain letters”“chain letters” and are explicitly illegal.and are explicitly illegal.

Page 25: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Can I play a joke on my friend Can I play a joke on my friend by deleting his/her files?by deleting his/her files?

No.No. Such activities are illegal, and Such activities are illegal, and you are not exempted from the law you are not exempted from the law because you are because you are “just a student”“just a student” or are underage or it was or are underage or it was “my “my friend”friend” even if you were even if you were “just“just playing around.”playing around.”

Page 26: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Can I get even with some jerk by Can I get even with some jerk by sending him a flood of e-mail sending him a flood of e-mail messages?messages?

No.No. This is called a This is called a “mail bomb“mail bomb”” and is inappropriate use of and is inappropriate use of resources.resources.

Page 27: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Can I copy some vendors software Can I copy some vendors software for my friends?for my friends?

No.No. It is a violation of university policy It is a violation of university policy and federal law to participate in and federal law to participate in copyright infringement. Copyrighted copyright infringement. Copyrighted materials include, but are not limited to, materials include, but are not limited to, computer software, audio and video computer software, audio and video recordings, photographs, and written recordings, photographs, and written material. material.

Violators are subject to University Violators are subject to University discipline, as well as legal liability, discipline, as well as legal liability, generally – even if the work does not generally – even if the work does not contain a written copyright notice.contain a written copyright notice.

Page 28: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

IV- What can happen?IV- What can happen?

What are the repercussions for violating What are the repercussions for violating the rules as listed in section III of Can the rules as listed in section III of Can I…?I…?

Punishment for infractions include but is Punishment for infractions include but is not necessarily limited to:not necessarily limited to:

1- Verbal warnings1- Verbal warnings2- Revocation of computing privileges2- Revocation of computing privileges3- Disciplinary probation3- Disciplinary probation4- Suspension and/or expulsion from 4- Suspension and/or expulsion from

universityuniversity5- Civil liability5- Civil liability6- Criminal prosecution6- Criminal prosecution

Page 29: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

V- What is not against L-A-W V- What is not against L-A-W OR POLICY?OR POLICY?

Before you report what you believe is an Before you report what you believe is an incident of misuse make sure you are on incident of misuse make sure you are on the right track.the right track.

First Amendment rights:First Amendment rights:In general, expressions of opinion by In general, expressions of opinion by

members of the university community that members of the university community that do not violate the law or university rules do not violate the law or university rules are protected as “free speech.” We are protected as “free speech.” We encourage all those associated with the encourage all those associated with the University to exercise their constitutional University to exercise their constitutional rights and freedoms responsibility.rights and freedoms responsibility.

Page 30: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

AUC does not punish its students AUC does not punish its students for expressing views that may be for expressing views that may be unpopular or offensive, but who unpopular or offensive, but who break no laws or University rules break no laws or University rules while doing so.while doing so.

V- What is not against L-A-W OR V- What is not against L-A-W OR POLICY? Contd.POLICY? Contd.

Page 31: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

““Spam” MailSpam” Mail

““SpamSpam,” unsolicited and unwanted e-,” unsolicited and unwanted e-mail, and other junk mail from a source mail, and other junk mail from a source outside this university. outside this university.

Many people are annoyed by junk mail Many people are annoyed by junk mail such as “spam” and other kinds such as “spam” and other kinds unsolicited or unwanted e-mail.unsolicited or unwanted e-mail.

It is not unusual, for junk mail to originate It is not unusual, for junk mail to originate from a source outside the University. In from a source outside the University. In most such cases, the University has most such cases, the University has little control. In most cases, the little control. In most cases, the University has little control.University has little control.

Page 32: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

However, as a recipient you have a However, as a recipient you have a great deal of control:great deal of control:

1- You can ignore or delete the 1- You can ignore or delete the junk mail.junk mail.

2- You can filter your email so the 2- You can filter your email so the offending mail is filed unread in a offending mail is filed unread in a junk mail file, allowing you to junk mail file, allowing you to delete it at your leisure.delete it at your leisure.

““Spam” Mail contd.Spam” Mail contd.

Page 33: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

Breaches of “Netiquette”Breaches of “Netiquette”

Disagreements between people, even Disagreements between people, even heated arguments, unless threatening or heated arguments, unless threatening or otherwise unlawful, are not considered otherwise unlawful, are not considered violations. We do however, strongly violations. We do however, strongly encourage all users to be polite.encourage all users to be polite.

A well-known problem with email, news-A well-known problem with email, news-groups, and chat groups is that it’s easy to groups, and chat groups is that it’s easy to fire off a quick, angry response that you’ll fire off a quick, angry response that you’ll later wish you hadn’t sentlater wish you hadn’t sent. .

Page 34: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

In doing so, should you cross the In doing so, should you cross the line beyond merely being rude or line beyond merely being rude or stating an unpopular, offensive stating an unpopular, offensive view, you may run the risk of view, you may run the risk of violating criminal laws.violating criminal laws.

““Counting to tenCounting to ten” before saying ” before saying something you may later regret something you may later regret applies in cyberspace too.applies in cyberspace too.

Breaches of “Netiquette” Breaches of “Netiquette” contd.contd.

Page 35: What is Information Technology? Information Technology (IT) consists of computers, networks, and the applications they support such as electronic mail

VI- Reporting an incident?VI- Reporting an incident?

For reporting problems with mail, you For reporting problems with mail, you may want to notify the University may want to notify the University Network Services, Help Desk Network Services, Help Desk extensions: 5343,5625, 5624 located extensions: 5343,5625, 5624 located at the Hill House Building – 3at the Hill House Building – 3rdrd Floor Floor room 302. Your problem will then be room 302. Your problem will then be handled either by one of the Help handled either by one of the Help Desk personnel or you will be Desk personnel or you will be referred to the appropriate entity.referred to the appropriate entity.