userdoc:policies
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
userdoc:policies [2016/01/21 16:31] – prall | userdoc:policies [2023/06/16 13:07] (current) – prall | ||
---|---|---|---|
Line 8: | Line 8: | ||
If you receive a new computer please contact inventory[AT]ece.utoronto.ca with the MAC address, jack number, and your supervisor' | If you receive a new computer please contact inventory[AT]ece.utoronto.ca with the MAC address, jack number, and your supervisor' | ||
- | |||
- | === No user-installed WiFi access points === | ||
- | |||
- | Both UofT and ECE network policies prohibit user-installed wireless access points. All ECE office space is covered by the " | ||
=== Do not disclose your password to anyone === | === Do not disclose your password to anyone === | ||
Line 17: | Line 13: | ||
User login accounts on ECE servers are assigned for research purposes and should be treated accordingly. Never share or reveal your password to anyone else. Accounts are intended for the sole use of the account holder and should not be shared. For both security and privacy reasons, always choose long, strong passwords and do not reuse passwords on multiple services. | User login accounts on ECE servers are assigned for research purposes and should be treated accordingly. Never share or reveal your password to anyone else. Accounts are intended for the sole use of the account holder and should not be shared. For both security and privacy reasons, always choose long, strong passwords and do not reuse passwords on multiple services. | ||
- | === Observe copyright and software license terms === | + | === Observe copyright, software license |
+ | |||
+ | Much of the software | ||
+ | |||
+ | Please respect the copyright of software publishers and content creators. Do not take or share with others copies of University or department supplied software, installers, license keys, or other intellectual property. | ||
+ | |||
+ | Bear in mind that some research within ECE is done under non-disclosure agreements with third parties; awareness of these terms and maintaining proper security practices are important to fulfilling the intent of such agreements. | ||
+ | |||
+ | === No user-installed WiFi access points === | ||
+ | |||
+ | Both UofT and ECE network policies prohibit user-installed wireless access points. All ECE office space is covered by the " | ||
+ | |||
+ | === < | ||
- | Please respect the copyright of software publishers and content creators, and do not take or share with others copies of University or department supplied software, installers, license keys, or other intellectual property. Bear in mind that some research within ECE is done under non-disclosure agreements with third parties; awareness of these terms and maintaining proper security practices are important | + | < |
Line 29: | Line 37: | ||
* [[http:// | * [[http:// | ||
- | * [[http:// | + | * [[https:// |
The second document says, in part: | The second document says, in part: | ||
Line 57: | Line 65: | ||
Here are links to some more pages where the University sets out policies which touch on information and communication technology: | Here are links to some more pages where the University sets out policies which touch on information and communication technology: | ||
- | * [[http://www.utoronto.ca/ | + | * [[https://cns.utoronto.ca/ |
* [[http:// | * [[http:// | ||
Line 63: | Line 71: | ||
* [[http:// | * [[http:// | ||
+ | ==== Security Incident Reporting ==== | ||
+ | All computer security incidents occurring within ECE must be reported to ECE’s Director, Information Technology, for periodic reporting to ECE’s Chair, senior management team, and others as required. | ||
+ | It is critical that any system log files (in case of security breach or other unauthorized access) and full email headers (in cases involving the use of email) are saved. Detailed logs should include information such as date and time of incident, IP numbers, protocols used, etc. | ||
+ | If necessary, incidents will be reported immediately to ECE’s Chair and senior management team, and/or the faculty’s Associate Director, Information Security and Enterprise Systems. | ||
userdoc/policies.1453411910.txt.gz · Last modified: 2016/01/21 16:31 by prall