Print

Print


>Under the current AUP and upcoming Statement of Acceptable Use,
accessing private
>files, emails, logs, etc. are still inaccessible to IT.  The only
time IT is allowed to access
>systems logs and/or files is either having written approval from the
Vice-Provost or by
>responding to a search warrant.

So does that mean that if I access my users PRIVATE FILES that they
stored on the DEPARTMENT SERVER to restore them from a BACKUP TAPE
because they deleted them I have to have "written approval from the
Vice-Provost"?

-t


On Tue, 29 Mar 2005 16:43:26 -0500, Linda Losik <[log in to unmask]> wrote:
>
>
>
> As a member of the AUP rewrite committee, here are some thoughts.
>
>
>
> If the end user agrees to allow you to access the desktop, you will be able
> to access the desktop and only the desktop. You can only access what you are
> given permission to access, and only enough that will allow the current
> technical issue to be resolved. And you cannot access anything else without
> the user's permission.  This means that the user should not have to look for
> the color change from blue to green.  The user should know immediately when
> IT logs on and logs off.  The user should be able to terminate the process
> at any time.
>
>
>
> Under the current AUP and upcoming Statement of Acceptable Use, accessing
> private files, emails, logs, etc. are still inaccessible to IT.  The only
> time IT is allowed to access systems logs and/or files is either having
> written approval from the Vice-Provost or by responding to a search warrant.
>  The right to privacy is still paramount within both documents.  For
> troubleshooting, the process has been described as "peeling an onion" on
> order to preserve privacy.
>
>
>
> I would have real concerns as to whether this app is approved by either the
> AUP or the SAU.  Perhaps others of the rewrite committee would care to
> address this as well
>
>
>
> Linda Losik
>
> Health Information Technology
>
>
>
>  ________________________________
>
>
> From: MSU Network Administrators Group [mailto:[log in to unmask]] On
> Behalf Of Jesse Howard
>  Sent: Tuesday, March 29, 2005 3:47 PM
>
>  To: [log in to unmask]
>  Subject: Re: [MSUNAG] Virtual Network Computing
>
>
>
>
>
> Troy,
>
>
> Thanks for the reply. In the email that was sent out describing UltraVNC and
> what it does, the staffer who wrote the email used screen captures of both
> the features that you mention, the pop-up permission window and the system
> tray icon changing from blue to green.
>
> Okay, so there's at least one department that uses VNC. Any others? Anyone
> want to address whether or not VNC is legal under the AUP?
>
> And what about the privacy issue? Anyone care to make an interpretation of
> the AUP on where the IT admin's responsibilities end and the users rights
> begin at the workstation?
>
> Jesse Howard
>  _______________________
>
>  IT Administrator
>  Michigan State University Press
>  [log in to unmask]
>  www.msupress.msu.edu
>
>
> -----Original Message-----
>  From: MSU Network Administrators Group [mailto:[log in to unmask]]On
> Behalf Of Samone E. Jones
>  Sent: Tuesday, March 29, 2005 3:34 PM
>  To: [log in to unmask]
>  Subject: Re: [MSUNAG] Virtual Network Computing
>
>
> Years ago when I used PCAnywhere for the same purpose, we had the same
> issue.
>
>
> PCAnywhere had a visual indicator - I think it was a little pc that turned
> green when someone
>
>
> else connected to the machine. So to soothe the users that were leery, we
> taught them how to identify when
>
>
> one of the IT staff were connected to the PC by using the visual indicator
> in the task bar.
>
>
>
>
>
> My point is maybe UltraVNC has a visual indicator like PCAnywhere - I think
> that would be a good way to get the
>
>
> users to put their guards down.
>
>
>
>
>
>
>  SJ
>
>
>
>
>
>
>
> Samone E. Jones
>
> Information Technologist
>
> Family Consumer Sciences
>
> Phone: 517.432.4552
>
> Email: [log in to unmask]
>
>
> -----Original Message-----
>  From: MSU Network Administrators Group [mailto:[log in to unmask]] On
> Behalf Of Jesse Howard
>  Sent: Tuesday, March 29, 2005 2:10 PM
>  To: [log in to unmask]
>  Subject: [MSUNAG] Virtual Network Computing
>
>
> I want to start using UltraVNC in our office domain, for tech support and
> helpdesk purposes at the workstation level. A few of our users have gotten
> the idea that we are going to use it to spy on them, and look at their
> email. It's become a bit of a PR problem for the IT Admin staff.
>
>
> So I am wondering, is it legal to use software like this at MSU, under the
> AUP? If so, who here is using it? Have you run into issues with users like
> this, where they interpret something you are doing as an attack on their
> privacy? If so, how did you handle it? We have sent out an email describing
> the software, what it does, and the fact that we won't use it without their
> permission. It doesn't seem to have helped much.
>
>
> Any ideas?
>
>
>
>
>
> Jesse Howard
>  _______________________
>
>  IT Administrator
>  Michigan State University Press
>  [log in to unmask]
>  www.msupress.msu.edu
>
>
>


--
Troy Murray
Blog: http://troymen.blogspot.com/
I have 50 GMail invites, who wants one?