You are on page 1of 4

For this activity, you are asked to:

Company/
Educational
Institutions
Yale Information University information may only be accessed by
University Access and persons when they are performing activities and
Security responsibilities associated with their University
position.

University information may only be disclosed to


individuals where a Yale business need exists and
the individual has appropriate authorization.
There are specific policies restricting the sharing
of HIPAA, FERPA, PCI, PII and other forms or
federally or locally regulated data.

Those authorized to access University


information are responsible for properly storing
and securing it from unauthorized access. This
includes encrypting data, securing and protecting
passwords, keys, and other forms of access
control.
Information This Policy applies to all Users of IT Systems,
Technology including but not limited to University students,
Appropriate Use faculty, and staff. It applies to the use of all IT
Policy Systems. These include systems, networks, and
facilities administered by ITS, as well as those
administered by individual schools, departments,
University laboratories, and other University-
based entities.

Use of IT Systems, even when carried out on a


privately owned computer or other device that is
not owned, managed, or maintained by Yale
University, is governed by this Policy.

Policy Statement

The purpose of this Policy is to ensure an


information technology infrastructure that
promotes the basic missions of the University in
teaching, learning, research, patient care, and
administration. In particular, this Policy aims to
promote the following goals:
To ensure the integrity, reliability, availability,
and superior performance of IT Systems;

To ensure that use of IT Systems is consistent


with the principles and values that govern use of
other University facilities and services;

To ensure that IT Systems are used for their


intended purposes; and

To establish processes for addressing policy


violations and sanctions for violators.

Harvard Open Access In the words of OSC Director Peter Suber,


University Policies author of Open Access, "The basic idea of OA is
simple: Make research literature available online
without price barriers and without most
permission barriers."

Scholarly articles provided to the university are


stored, preserved, and made freely accessible in
digital form in DASH, Harvard University
Library's open access repository. The repository
has the institution of Harvard standing behind it
to ensure its availability, longevity, and
functionality.

Digital The Digital Millennium Copyright Act


Millennium ("DMCA") of 1998 endeavors to balance the
Copyright Act interests of internet service providers and
copyright owners when copyright infringement
occurs in the digital environment. The DMCA
protects internet service providers from liability
for copyright infringement by their users, if the
internet service provider meets certain statutory
requirements. To fall within the protection of the
DMCA, an internet service provider must, among
other things, take certain steps when it receives
notice that infringing material resides on its
network; adopt and implement a policy that
provides for termination in appropriate
circumstances of users who are repeat infringers;
and accommodate standard technical measures
that are used by copyright owners to identify and
protect copyrighted works. The DMCA protects
only the internet service provider, and not the
users of its system who infringe copyright.
University of Data Protection Users shall treat as confidential any information
Oxford Policy which may become available to them through the
use of such facilities and which is not clearly
intended for unrestricted dissemination; such
information shall not be copied, modified,
disseminated, or used either in whole or in part
without the permission of the individual or body
entitled to give it.

Globe

Harvard

Samsung

Policies:

Privacy Policy - smsung

Fianncial System Access Policy - harvard

Copyright Policy - harvard

General Disclosure Policy

Data Protection Policy- yale

a.  Look (ask) for IT Policies of at least 3 companies (or educational institutions). 
Write down names (and/or URL) of your source.

b.  Give at least 5 IT policies (which you have gathered from the 3 companies) which
you think are applicable to USLS.
c.  Give reasons for each on why (or where) you think they are applicable to USLS.

You might also like