13.07.2015 Views

InfoSec Acceptable Use Policy - Duke's Fuqua School of Business

InfoSec Acceptable Use Policy - Duke's Fuqua School of Business

InfoSec Acceptable Use Policy - Duke's Fuqua School of Business

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

limited to, network sniffing, pinged floods, packet spo<strong>of</strong>ing, denial <strong>of</strong> service, and forged routinginformation for malicious purposes.10. Port scanning or security scanning is expressly prohibited unless prior notification to <strong>Fuqua</strong> ismade.11. Executing any form <strong>of</strong> network monitoring which will intercept data not intended for theemployee's host, unless this activity is a part <strong>of</strong> the user’s normal job/duty.12. Circumventing user authentication or security <strong>of</strong> any host, network or account.13. Interfering with or denying service to any user other than the employee's host (for example, denial<strong>of</strong> service attack).14. Using any program/script/command, or sending messages <strong>of</strong> any kind, with the intent to interferewith, or disable, a user's terminal session, via any means, locally or via theInternet/Intranet/Extranet.15. Providing information about, or lists <strong>of</strong>, <strong>Fuqua</strong> users to parties outside <strong>Fuqua</strong>.Email and Communications Activities1. Sending unsolicited email messages, including the sending <strong>of</strong> "junk mail" or other advertisingmaterial to individuals who did not specifically request such material (email spam).2. Any form <strong>of</strong> harassment via email, telephone or paging, whether through language, frequency, orsize <strong>of</strong> messages.3. Unauthorized use, or forging, <strong>of</strong> email header information.4. Solicitation <strong>of</strong> email for any other email address, other than that <strong>of</strong> the poster's account, with theintent to harass or to collect replies.5. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes <strong>of</strong> any type.6. <strong>Use</strong> <strong>of</strong> unsolicited email originating from within <strong>Fuqua</strong>'s networks <strong>of</strong> otherInternet/Intranet/Extranet service providers on behalf <strong>of</strong>, or to advertise, any service hosted by<strong>Fuqua</strong> or connected via <strong>Fuqua</strong>'s network.7. Posting the same or similar non-business-related messages to large numbers <strong>of</strong> <strong>Use</strong>net newsgroups(newsgroup spam).4.4. Blogging1. Blogging by users, whether using <strong>Fuqua</strong>’s property and systems or personal computer systems, isalso subject to the terms and restrictions set forth in this policy. Limited and occasional use <strong>of</strong><strong>Fuqua</strong>’s systems to engage in blogging is acceptable, provided that it is done in a pr<strong>of</strong>essional andresponsible manner, does not otherwise violate <strong>Fuqua</strong>’s policy, is not detrimental to <strong>Fuqua</strong>’s bestinterests, and does not interfere with an employee's regular work duties. Blogging from <strong>Fuqua</strong>’ssystems is also subject to monitoring.2. <strong>Fuqua</strong>’s Information Sensitivity policy also applies to blogging. As such, <strong>Use</strong>rs are prohibitedfrom revealing any <strong>Fuqua</strong> confidential or proprietary information, trade secrets or any othermaterial covered by <strong>Fuqua</strong>’s Information Sensitivity policy when engaged in blogging.3. <strong>Use</strong>rs shall not engage in any blogging that may harm or tarnish the image, reputation and/orgoodwill <strong>of</strong> <strong>Fuqua</strong> and/or any <strong>of</strong> its affiliates. <strong>Use</strong>rs are also prohibited from making anydiscriminatory, disparaging, defamatory or harassing comments when blogging or otherwiseengaging in any conduct prohibited by Duke University’s Non-Discrimination and Anti-Harassment policy as detailed in the Staff Handbook.4. <strong>Use</strong>rs may also not attribute personal statements, opinions or beliefs to <strong>Fuqua</strong> when engaged inblogging. If a user is expressing his or her beliefs and/or opinions in blogs, the user may not,expressly or implicitly, represent themselves as an employee or representative <strong>of</strong> <strong>Fuqua</strong>. <strong>Use</strong>rsassume any and all risk associated with blogging.5. Apart from following all laws pertaining to the handling and disclosure <strong>of</strong> copyrighted or exportcontrolled materials, <strong>Fuqua</strong>’s trademarks, logos and any other <strong>Fuqua</strong> intellectual property mayalso not be used in connection with any blogging activity.5.0 EnforcementAny employee found to have violated this policy may be subject to disciplinary action, up to and includingtermination <strong>of</strong> employment.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!