Educause Security Discussion mailing list archives

Re:


From: Joel Rosenblatt <joel () COLUMBIA EDU>
Date: Wed, 15 Jun 2005 09:32:56 -0400

Our network use policy:

<http://www.columbia.edu/cu/policy/network_use.html>

Has the following section:

22. All messages must show accurately from where and from whom the message
originated, except in the rare, specific cases where anonymous messages are
invited.

Joel Rosenblatt

Joel Rosenblatt, Senior Security Officer & Windows Specialist, AcIS
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel

--On Wednesday, June 15, 2005 8:28 AM -0400 Gary Flynn <flynngn () JMU EDU>
wrote:

Theresa Semmens wrote:
We're looking at the possibility of providing in a policy that it would
be an acceptable use violation to misrepresent who one is when
communicating with a university official; particularly as it applies to
employees.

This is to get at the situation where someone uses an alias to
communicate on a work related matter to someone else.

I'm wondering if any of you have such a restriction in place, or could
point me to a policy with such a restriction. Any advice or suggestions
would be helpful.


Our AUP has the following language:

"# Not use university resources or computers attached to
  the university network to falsify identity, for example by:

     * Providing "pass through" service
     * Sending electronic mail under forged headers"

By strict interpretation, if an external computer
is used to send a forged message through the JMU
network and/or to a JMU account, that is use of
university resources.


http://www.jmu.edu/JMUpolicy/1207.shtml



--
Gary Flynn
Security Engineer
James Madison University



Joel Rosenblatt, Senior Security Officer & Windows Specialist, AcIS
Columbia University, 612 W 115th Street, NY, NY 10025 / 212 854 3033
http://www.columbia.edu/~joel

Current thread: