tailieunhanh - Computer & Network Usage and Security Policy

There are several organizations designed to help facilitate information sharing now, and there is some sharing going on with varying degrees of success. But not nearly enough. We largely agree with those who believe that a new entity – separate from the federal government but perhaps partially funded by the federal government – is needed to sponsor this sharing to allow for active defense. But whether a new entity is created or an effort is made to invigorate existing structures, changes to the law are required to allow government and industry to share. . | Computer Network Usage and Security Policy Rev. Effective Date July 1 2005 Last Revised February 2 2011 The following are responsible for the accuracy of the information contained in this document Responsible University Officer Chief Information Officer CIO Responsible Coordinating Office Georgia Tech Office of Information Technology OIT 1. Executive Summary Georgia Tech s Computer and Network Usage and Security Policy CNUSP provides the guiding principles for use of Information Technology IT Resources at Georgia Tech. It is the policy of the Institute that its IT resources be used ethically and legally in accord with applicable licenses and contracts and according to their intended use in support of the Institute s mission. Faculty staff and students are expected to behave in an ethical1 and professional manner when using IT Resources. The CNUSP establishes the necessary balance between Georgia Tech s culture of openness trust and integrity and the appropriate level of security to protect resources. The principles established are 1. The Institute is committed to protecting Georgia Tech users of IT resources and data. 2. The Institute is committed to protecting the Confidentiality Integrity and Availability of Georgia Tech IT resources and data. 3. Users of Georgia Tech IT resources and data will be good stewards of the resources to which they have access and will act in a responsible manner. 4. The Institute is bound by federal state and local laws as well as contractual and regulatory obligations to protect access to Georgia Tech IT resources and data. 2. Scope This Institute-wide policy addresses proper use of all Georgia Tech IT resources and applies to all users of Georgia Tech resources. All business agreements and contracts must comply with this policy and the Georgia Tech Data Access Policy. The CNUSP is the governing information technology policy for Georgia Tech. Other policies standards procedures and safeguards documents may augment restrictions .