![]() ![]() As anti-spam technology has become more sophisticated, many users have had messages marked by email providers as spam or junk mail. The Fuqua alumni email address was set up to forward emails to a target email account of the user’s choosing. Users should take allnecessary steps to prevent unauthorized access to this information.Why is Fuqua no longer offering an alumni email address? Examples ofconfidential information include but are not limited to: Fuqua private, Fuqua strategies, competitorsensitive, trade secrets, specifications, customer lists, and research data. The user interface for information contained on Internet/Intranet/Extranet-related systems shouldbe classified as either confidential or not confidential, as defined by Duke University’sconfidentiality guidelines, details of which can be found in the Staff Handbook. Fuqua reserves the right to audit networks and systems on a periodic basis to ensure compliancewith this policy.4.2 Security and Proprietary Information1. ![]() For security and network maintenance purposes, authorized individuals within Fuqua may monitorequipment, systems and network traffic at any time, per Fuqua’s Audit Policy.5. Fuqua recommends that any information that users consider sensitive or vulnerable be encrypted.For guidelines on information classification, see Fuqua’s Information Sensitivity Policy.4. In the absence of such policies, users should be guided bydepartmental policies on personal use, and if there is any uncertainty, users should consult theirsupervisor or manager.3. Users are responsible for exercising good judgment regarding the reasonableness of personal use.Individual departments are responsible for creating guidelines concerning personal use ofInternet/Intranet/Extranet systems. While Fuqua's network administration desires to provide a reasonable level of privacy, usersshould be aware that the data they create on the corporate systems remains the property of Fuqua.Because of the need to protect Fuqua's network, management cannot guarantee the confidentialityof information stored on any network device belonging to Fuqua.2. This policy applies to all equipmentthat is owned or leased by Fuqua.4.0 Policy4.1 General Use and Ownership1. ![]() Inappropriate use exposes Fuqua to risks including virus attacks,compromise of network systems and services, and legal issues.3.0 ScopeThis policy applies to employees, contractors, consultants, temporaries, and other workers at Fuqua,including all personnel affiliated with third parties, as well as students. These rules arein place to protect the user and Fuqua. It is the responsibility of every computeruser to know these guidelines, and to conduct their activities accordingly.2.0 PurposeThe purpose of this policy is to outline the acceptable use of computer equipment at Fuqua. Fuqua is committed to protecting Fuqua's employees,partners and the college from illegal or damaging actions by individuals, either knowingly or unknowingly.Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software,operating systems, storage media, network accounts providing electronic mail, Please review Human Resources policies for further details.Effective security is a team effort involving the participation and support of every Fuqua employee andaffiliate who deals with information and/or information systems. ![]() Fuqua Acceptable Use Policy1.0 OverviewThe intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary tothe established culture of openness, trust and integrity at Duke University’s Fuqua School of Business(noted as “Fuqua” for the rest of this document). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |