User Tools

Site Tools


userdoc:policies

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
userdoc:policies [2016/01/21 16:31] pralluserdoc:policies [2023/06/16 13:07] (current) prall
Line 8: Line 8:
  
 If you receive a new computer please contact inventory[AT]ece.utoronto.ca with the MAC address, jack number, and your supervisor's name. Do not manually reassign the Tier 1 or Tier 2 IP of your currently assigned PC to a new PC nor to any other device. Do not modify or erase the installed operating system or network settings on any Tier 1 PC - instead contact ECEHELP for these changes. If you are on Tier 1 and want to reinstall your own O/S, you must transfer to Tier 2; you must notify ECEHELP and obtain your supervisor's permission BEFORE doing so. If you receive a new computer please contact inventory[AT]ece.utoronto.ca with the MAC address, jack number, and your supervisor's name. Do not manually reassign the Tier 1 or Tier 2 IP of your currently assigned PC to a new PC nor to any other device. Do not modify or erase the installed operating system or network settings on any Tier 1 PC - instead contact ECEHELP for these changes. If you are on Tier 1 and want to reinstall your own O/S, you must transfer to Tier 2; you must notify ECEHELP and obtain your supervisor's permission BEFORE doing so.
- 
-=== No user-installed WiFi access points === 
- 
-Both UofT and ECE network policies prohibit user-installed wireless access points. All ECE office space is covered by the "UofT" wireless-N network, accessed using your UTORid. (The former departmental "Colubris"/"ECE Secure" wireless network has been decommissioned.)  UofT network wireless connectivity is intended for transient or short term wireless connectivity for portable laptops and tablets and smart phones, and is not intended to provide constant connections for desktop computers or other "permanent" installations. 
  
 === Do not disclose your password to anyone === === Do not disclose your password to anyone ===
Line 17: Line 13:
 User login accounts on ECE servers are assigned for research purposes and should be treated accordingly. Never share or reveal your password to anyone else. Accounts are intended for the sole use of the account holder and should not be shared. For both security and privacy reasons, always choose long, strong passwords and do not reuse passwords on multiple services.  User login accounts on ECE servers are assigned for research purposes and should be treated accordingly. Never share or reveal your password to anyone else. Accounts are intended for the sole use of the account holder and should not be shared. For both security and privacy reasons, always choose long, strong passwords and do not reuse passwords on multiple services. 
  
-=== Observe copyright and software license terms ===+=== Observe copyright, software license and NDA terms === 
 + 
 +Much of the software used in ECE is licensed from commercial software publishers. Many publishers offer special licensing terms for classroom or for academic research use; these generally exclude use for any commercial or for-profit purposes. Your I.T. support group can point you to the exact terms of use for each title we license
 + 
 +Please respect the copyright of software publishers and content creators. Do not take or share with others copies of University or department supplied software, installers, license keys, or other intellectual property.  
 + 
 +Bear in mind that some research within ECE is done under non-disclosure agreements with third parties; awareness of these terms and maintaining proper security practices are important to fulfilling the intent of such agreements. 
 + 
 +=== No user-installed WiFi access points === 
 + 
 +Both UofT and ECE network policies prohibit user-installed wireless access points. All ECE office space is covered by the "UofT" wireless-N network, accessed using your UTORid. (The former departmental "Colubris"/"ECE Secure" wireless network has been decommissioned.)   
 + 
 +=== <del>No desktops on wifi</del> ===
  
-Please respect the copyright of software publishers and content creators, and do not take or share with others copies of University or department supplied software, installers, license keys, or other intellectual property. Bear in mind that some research within ECE is done under non-disclosure agreements with third partiesawareness of these terms and maintaining proper security practices are important to fulfilling the intent of such agreements.+<del>UofT network wireless connectivity is very heavily used, and is intended solely for transient or short term wireless connectivity for portable laptops and tablets and smart phones; and is not intended to provide constant connections for desktop computers or other "permanent" installations.</del>
  
  
Line 29: Line 37:
   * [[http://www.governingcouncil.utoronto.ca/policies/studentc.htm|Code of Student Conduct]] (relevant to students)   * [[http://www.governingcouncil.utoronto.ca/policies/studentc.htm|Code of Student Conduct]] (relevant to students)
  
-  * [[http://www.provost.utoronto.ca/policy/use.htm|Appropriate Use of Information and Communication Technology]] (relevant to all)+  * [[https://www.provost.utoronto.ca/planning-policy/information-communication-technology-appropriate-use/|Appropriate Use of Information and Communication Technology]] (relevant to all)
  
 The second document says, in part: The second document says, in part:
Line 57: Line 65:
 Here are links to some more pages where the University sets out policies which touch on information and communication technology: Here are links to some more pages where the University sets out policies which touch on information and communication technology:
  
-  * [[http://www.utoronto.ca/newsite/documentation/policies/policy_5.htm|UofT Network Security Policies]]+  * [[https://cns.utoronto.ca/newsite/documentation/policies/policy_5.htm|UofT Network Security Policies]]
  
   * [[http://www.noc.utoronto.ca/net-ops/security/traffic.htm|UofT Network Traffic Monitoring]]   * [[http://www.noc.utoronto.ca/net-ops/security/traffic.htm|UofT Network Traffic Monitoring]]
Line 63: Line 71:
   * [[http://www.utoronto.ca/security|Website of UofT Computer Security Administration]]   * [[http://www.utoronto.ca/security|Website of UofT Computer Security Administration]]
  
 +==== Security Incident Reporting ====
 +All computer security incidents occurring within ECE must be reported to ECE’s Director, Information Technology, for periodic reporting to ECE’s Chair, senior management team, and others as required.
 +It is critical that any system log files (in case of security breach or other unauthorized access) and full email headers (in cases involving the use of email) are saved. Detailed logs should include information such as date and time of incident, IP numbers, protocols used, etc.
 +If necessary, incidents will be reported immediately to ECE’s Chair and senior management team, and/or the faculty’s Associate Director, Information Security and Enterprise Systems.
  
  
userdoc/policies.1453411910.txt.gz · Last modified: 2016/01/21 16:31 by prall

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki