Educause Security Discussion mailing list archives

Re: Student breaking IT policies


From: "Lorenz, Eva" <evalorenz () UNC EDU>
Date: Fri, 18 Mar 2011 17:18:54 +0000

Our policies have an enforcement section that, where appropriate, lists students as the target audience, and as 
possible consequences a generic "violation of honor code". Consequences from violating the honor code can range from a 
meeting with admin staff to more serious consequences such as temporary dismissal from the university.
For certain groups, such as business units in which work study students will likely encounter sensitive information, 
students sign an NDA and have some basic training in computer security, including reference to university policies and 
compliance.


-          Eva

From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Radford, 
Jennifer
Sent: Friday, March 18, 2011 12:43 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] FW: Student breaking IT policies


e.g. removal of computer abilities for a period of time.

It also makes things easier it the students are made to sign a computer usage agreement which clearly states their 
responisiblities and what they can and cannot do.

Cheers,

Jen
________________________________
From: Radford, Jennifer
Sent: March-18-11 9:40 AM
To: The EDUCAUSE Security Constituent Group Listserv
Subject: RE: Student breaking IT policies
Hi Mark,

Best practice is that this should be clearly documented in the relevant policy as a deterrent. If the policy is clearly 
documented and communicated then management has clear guidance on what should be done in such instances, e.g. removal 
of c

________________________________
From: The EDUCAUSE Security Constituent Group Listserv [SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Mark Reboli 
[mreboli () MISERICORDIA EDU]
Sent: March-18-11 9:31 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Student breaking IT policies

1.       What do you do if a student breaks the computer usage policy

2.       What do you do to educate students on the computer usage policy


Thank you



[med icon 117 f copy (2)]
Mark Reboli
Network/Telcom/IT Security MGR
Misericordia University
570-674-6753


Current thread: