Educause Security Discussion mailing list archives
Re:
From: Joel Rosenblatt <joel () COLUMBIA EDU>
Date: Wed, 15 Jun 2005 09:32:56 -0400
Our network use policy: <http://www.columbia.edu/cu/policy/network_use.html> Has the following section: 22. All messages must show accurately from where and from whom the message originated, except in the rare, specific cases where anonymous messages are invited. Joel Rosenblatt Joel Rosenblatt, Senior Security Officer & Windows Specialist, AcIS Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033 http://www.columbia.edu/~joel --On Wednesday, June 15, 2005 8:28 AM -0400 Gary Flynn <flynngn () JMU EDU> wrote:
Theresa Semmens wrote:We're looking at the possibility of providing in a policy that it would be an acceptable use violation to misrepresent who one is when communicating with a university official; particularly as it applies to employees. This is to get at the situation where someone uses an alias to communicate on a work related matter to someone else. I'm wondering if any of you have such a restriction in place, or could point me to a policy with such a restriction. Any advice or suggestions would be helpful.Our AUP has the following language: "# Not use university resources or computers attached to the university network to falsify identity, for example by: * Providing "pass through" service * Sending electronic mail under forged headers" By strict interpretation, if an external computer is used to send a forged message through the JMU network and/or to a JMU account, that is use of university resources. http://www.jmu.edu/JMUpolicy/1207.shtml -- Gary Flynn Security Engineer James Madison University
Joel Rosenblatt, Senior Security Officer & Windows Specialist, AcIS Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033 http://www.columbia.edu/~joel
Current thread:
- Re: Joel Rosenblatt (Jun 15)