>Under the current AUP and upcoming Statement of Acceptable Use, accessing private >files, emails, logs, etc. are still inaccessible to IT. The only time IT is allowed to access >systems logs and/or files is either having written approval from the Vice-Provost or by >responding to a search warrant. So does that mean that if I access my users PRIVATE FILES that they stored on the DEPARTMENT SERVER to restore them from a BACKUP TAPE because they deleted them I have to have "written approval from the Vice-Provost"? -t On Tue, 29 Mar 2005 16:43:26 -0500, Linda Losik <[log in to unmask]> wrote: > > > > As a member of the AUP rewrite committee, here are some thoughts. > > > > If the end user agrees to allow you to access the desktop, you will be able > to access the desktop and only the desktop. You can only access what you are > given permission to access, and only enough that will allow the current > technical issue to be resolved. And you cannot access anything else without > the user's permission. This means that the user should not have to look for > the color change from blue to green. The user should know immediately when > IT logs on and logs off. The user should be able to terminate the process > at any time. > > > > Under the current AUP and upcoming Statement of Acceptable Use, accessing > private files, emails, logs, etc. are still inaccessible to IT. The only > time IT is allowed to access systems logs and/or files is either having > written approval from the Vice-Provost or by responding to a search warrant. > The right to privacy is still paramount within both documents. For > troubleshooting, the process has been described as "peeling an onion" on > order to preserve privacy. > > > > I would have real concerns as to whether this app is approved by either the > AUP or the SAU. Perhaps others of the rewrite committee would care to > address this as well > > > > Linda Losik > > Health Information Technology > > > > ________________________________ > > > From: MSU Network Administrators Group [mailto:[log in to unmask]] On > Behalf Of Jesse Howard > Sent: Tuesday, March 29, 2005 3:47 PM > > To: [log in to unmask] > Subject: Re: [MSUNAG] Virtual Network Computing > > > > > > Troy, > > > Thanks for the reply. In the email that was sent out describing UltraVNC and > what it does, the staffer who wrote the email used screen captures of both > the features that you mention, the pop-up permission window and the system > tray icon changing from blue to green. > > Okay, so there's at least one department that uses VNC. Any others? Anyone > want to address whether or not VNC is legal under the AUP? > > And what about the privacy issue? Anyone care to make an interpretation of > the AUP on where the IT admin's responsibilities end and the users rights > begin at the workstation? > > Jesse Howard > _______________________ > > IT Administrator > Michigan State University Press > [log in to unmask] > www.msupress.msu.edu > > > -----Original Message----- > From: MSU Network Administrators Group [mailto:[log in to unmask]]On > Behalf Of Samone E. Jones > Sent: Tuesday, March 29, 2005 3:34 PM > To: [log in to unmask] > Subject: Re: [MSUNAG] Virtual Network Computing > > > Years ago when I used PCAnywhere for the same purpose, we had the same > issue. > > > PCAnywhere had a visual indicator - I think it was a little pc that turned > green when someone > > > else connected to the machine. So to soothe the users that were leery, we > taught them how to identify when > > > one of the IT staff were connected to the PC by using the visual indicator > in the task bar. > > > > > > My point is maybe UltraVNC has a visual indicator like PCAnywhere - I think > that would be a good way to get the > > > users to put their guards down. > > > > > > > SJ > > > > > > > > Samone E. Jones > > Information Technologist > > Family Consumer Sciences > > Phone: 517.432.4552 > > Email: [log in to unmask] > > > -----Original Message----- > From: MSU Network Administrators Group [mailto:[log in to unmask]] On > Behalf Of Jesse Howard > Sent: Tuesday, March 29, 2005 2:10 PM > To: [log in to unmask] > Subject: [MSUNAG] Virtual Network Computing > > > I want to start using UltraVNC in our office domain, for tech support and > helpdesk purposes at the workstation level. A few of our users have gotten > the idea that we are going to use it to spy on them, and look at their > email. It's become a bit of a PR problem for the IT Admin staff. > > > So I am wondering, is it legal to use software like this at MSU, under the > AUP? If so, who here is using it? Have you run into issues with users like > this, where they interpret something you are doing as an attack on their > privacy? If so, how did you handle it? We have sent out an email describing > the software, what it does, and the fact that we won't use it without their > permission. It doesn't seem to have helped much. > > > Any ideas? > > > > > > Jesse Howard > _______________________ > > IT Administrator > Michigan State University Press > [log in to unmask] > www.msupress.msu.edu > > > -- Troy Murray Blog: http://troymen.blogspot.com/ I have 50 GMail invites, who wants one?