MSU Listserv


MSUNAG Archives

MSUNAG Archives


MSUNAG@LIST.MSU.EDU


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV at MSU

LISTSERV at MSU

MSUNAG Home

MSUNAG Home

MSUNAG  March 2005

MSUNAG March 2005

Subject:

Re: Virtual Network Computing

From:

Linda Losik <[log in to unmask]>

Reply-To:

Linda Losik <[log in to unmask]>

Date:

Tue, 29 Mar 2005 17:57:35 -0500

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (217 lines)

You can only access what you are given permission to access.  Yes, the
logs are private.  Example: IT cannot go to IE to read the history of
what web sites were accessed by the user without a search warrant or
permission from the Vice Provost.  

Please read the AUP at http://www.msu.edu/au/. The section entitled: IV.
Good Citizenship in "Cyberspace" should answer questions that you have
raised privacy. 

There is also another document that might assist in some definitions.
http://www.msu.edu/~ncc/Documents/SysOp/SysopD10.pdf This is the
proposed system administrator's guide that is also under review and
will, hopefully, be shorter than the current version.  This guide is
just a discussion document and is not official policy but it does
reflect the current AUP and the definitions used within the AUP.

I am concerned because I can see possibilities of possible misuse.

-----Original Message-----
From: MSU Network Administrators Group [mailto:[log in to unmask]] On
Behalf Of Michael Surato
Sent: Tuesday, March 29, 2005 5:10 PM
To: [log in to unmask]
Subject: Re: [MSUNAG] Virtual Network Computing

Hi, 
 
Perhaps some clarification would help. 

Are you stating that this software is in violation of the AUP because it
does not ask the user before beginning? If it does ask the user
permission, is it still in violation if the user then uses it to access
the logs or any other item besides the desktop? 

What is a private log? Are the system logs private? If so, on which
systems (i.e. are domain controllers considered "private" systems, and
thus the logs are inaccessible)?

The biggest concern I see in the AUP is the idea of private information.
That is to say, the delineation of public/accessible information and
private/inaccessible information creates several headaches for IT.
Especially if logs are included in the area of "private" information.

+-------------------------------------------+
|            Michael Surato                 |
|      Resource Center for Persons          |
|           with Disabilities               |
|      Michigan State University            |
|            120 Bessey Hall                |
|        East Lansing, MI 48824             |
| Voice: (517) 353-9643 Fax: (517) 432-3191 |
+-------------------------------------------+
  

 


________________________________

        From: MSU Network Administrators Group
[mailto:[log in to unmask]] On Behalf Of Linda Losik
        Sent: Tuesday, March 29, 2005 4:43 PM
        To: [log in to unmask]
        Subject: Re: [MSUNAG] Virtual Network Computing
	
	

        As a member of the AUP rewrite committee, here are some
thoughts.

         

        If the end user agrees to allow you to access the desktop, you
will be able to access the desktop and only the desktop. You can only
access what you are given permission to access, and only enough that
will allow the current technical issue to be resolved. And you cannot
access anything else without the user's permission.  This means that the
user should not have to look for the color change from blue to green.
The user should know immediately when IT logs on and logs off.  The user
should be able to terminate the process at any time.

         

        Under the current AUP and upcoming Statement of Acceptable Use,
accessing private files, emails, logs, etc. are still inaccessible to
IT.  The only time IT is allowed to access systems logs and/or files is
either having written approval from the Vice-Provost or by responding to
a search warrant.  The right to privacy is still paramount within both
documents.  For troubleshooting, the process has been described as
"peeling an onion" on order to preserve privacy.  

         

        I would have real concerns as to whether this app is approved by
either the AUP or the SAU.  Perhaps others of the rewrite committee
would care to address this as well

         

        Linda Losik 

        Health Information Technology 

         

        ________________________________

                From: MSU Network Administrators Group
[mailto:[log in to unmask]] On Behalf Of Jesse Howard
        Sent: Tuesday, March 29, 2005 3:47 PM
        To: [log in to unmask]
        Subject: Re: [MSUNAG] Virtual Network Computing

         

        Troy,

        Thanks for the reply. In the email that was sent out describing
UltraVNC and what it does, the staffer who wrote the email used screen
captures of both the features that you mention, the pop-up permission
window and the system tray icon changing from blue to green.

        Okay, so there's at least one department that uses VNC. Any
others? Anyone want to address whether or not VNC is legal under the
AUP? 

        And what about the privacy issue? Anyone care to make an
interpretation of the AUP on where the IT admin's responsibilities end
and the users rights begin at the workstation?

        Jesse Howard
        _______________________
	
        IT Administrator
        Michigan State University Press
        [log in to unmask]
        www.msupress.msu.edu

                -----Original Message-----
                From: MSU Network Administrators Group
[mailto:[log in to unmask]]On Behalf Of Samone E. Jones
                Sent: Tuesday, March 29, 2005 3:34 PM
                To: [log in to unmask]
                Subject: Re: [MSUNAG] Virtual Network Computing

                Years ago when I used PCAnywhere for the same purpose,
we had the same issue.

                PCAnywhere had a visual indicator - I think it was a
little pc that turned green when someone

                else connected to the machine. So to soothe the users
that were leery, we taught them how to identify when 

                one of the IT staff were connected to the PC by using
the visual indicator in the task bar.

                 

                My point is maybe UltraVNC has a visual indicator like
PCAnywhere - I think that would be a good way to get the

                users to put their guards down.

                 

        	
                SJ

                 

                 

                Samone E. Jones

                Information Technologist

                Family Consumer Sciences

                Phone: 517.432.4552

                Email: [log in to unmask]

                        -----Original Message-----
                        From: MSU Network Administrators Group
[mailto:[log in to unmask]] On Behalf Of Jesse Howard
                        Sent: Tuesday, March 29, 2005 2:10 PM
                        To: [log in to unmask]
                        Subject: [MSUNAG] Virtual Network Computing

                        I want to start using UltraVNC in our office
domain, for tech support and helpdesk purposes at the workstation level.
A few of our users have gotten the idea that we are going to use it to
spy on them, and look at their email. It's become a bit of a PR problem
for the IT Admin staff.

                        So I am wondering, is it legal to use software
like this at MSU, under the AUP? If so, who here is using it? Have you
run into issues with users like this, where they interpret something you
are doing as an attack on their privacy? If so, how did you handle it?
We have sent out an email describing the software, what it does, and the
fact that we won't use it without their permission. It doesn't seem to
have helped much.

                        Any ideas?

                         

                        Jesse Howard
                        _______________________
                	
                        IT Administrator
                        Michigan State University Press
                        [log in to unmask]
                        www.msupress.msu.edu

                         

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

December 2023
June 2023
May 2022
April 2022
March 2022
February 2022
December 2021
January 2019
August 2018
June 2018
May 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
July 2005
June 2005
May 2005
April 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
June 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001

ATOM RSS1 RSS2



LIST.MSU.EDU

CataList Email List Search Powered by the LISTSERV Email List Manager