CSA Class 2004 - apu.edu - Azusa Pacific University

advertisement
The Law, the Internet and Higher
Education
John Reynolds
Senior Vice President
Azusa Pacific University
A Brief Summary of the
Evolution of the Internet
First Vast
Computer
Network
Silicon Envisioned
Chip
A
1962
Mathematical 1958
Theory of
Communication
Memex
1948
Conceived
Packet
Switching
Invented
1964
Hypertext
Invented
1965
TCP/IP
Created
ARPANET
1972
1969
Mosaic
Created
WWW
Internet Created
1993
Named
1989
and
Goes
TCP/IP
1984
Age of
eCommerce
Begins
1995
1945
1945
1995
Internet Growth Trends
•
•
•
•
•
•
•
•
•
•
•
1977: 111 hosts on Internet
1981: 213 hosts
1983: 562 hosts
1984: 1,000 hosts
1986: 5,000 hosts
1987: 10,000 hosts
1989: 100,000 hosts
1992: 1,000,000 hosts
2001: 150 – 175 million hosts
2002: over 200 million hosts
By 2010, about 80% of the planet will be on the Internet
By September 2002
The Internet Reached Two
Important Milestones:
Netsizer.com – from Telcordia
Growth of Internet Hosts *
Sept. 1969 - Sept. 2002
250,000,000
Sept. 1, 2002
No. of Hosts
200,000,000
150,000,000
100,000,000
Dot-Com Bust Begins
50,000,000
9/
69
01
/7
1
01
/7
3
01
/7
4
01
/7
6
01
/7
9
08
/8
1
08
/8
3
10
/8
5
11
/8
6
07
/8
8
01
/8
9
10
/8
9
01
/9
1
10
/9
1
04
/9
2
10
/9
2
04
/9
3
10
/9
3
07
/9
4
01
/9
5
01
/9
6
01
/9
7
01
/9
8
01
/9
9
01
/0
1
08
/0
2
0
Time Period
Chart by William F. Slater, III
The Internet was not known as "The Internet" until January 1984, at which time
there were 1000 hosts that were all converted over to using TCP/IP.
Statistics from the IITF Report
The Emerging Digital Economy *
• To get a market of 50 Million People Participating:
• Radio took 38 years
• TV took 13 years
• Once it was open to the General Public, The Internet made
to the 50 million person audience mark in just 4 years!!!
• http://www.ecommerce.gov/emerging.htm
– Released on April 15, 1998
* Delivered to the President and the U.S. Public on April 15, 1998 by Bill Daley,
Secretary of Commerce and Chairman of the Information Infrastructure Task Force
What did this mean for Higher
Education?
• No freshman student today has not had
access to the internet in the U.S.A.
• The average age of faculty is now 54 in US
colleges and universities
• There is no limit to accessing data in text,
image, sound or stream format
• The internet is now the accepted starting
point for all research
Areas for today’s conversation
• The Internet and the student
• Controlling the internet through
legislation
• The Internet and the Institution
• Questions
The Internet and the Institution
Concerns
•
•
•
•
•
•
•
•
•
•
•
•
Use of bandwidth for non-academic purposes
Capacity issues
Streaming audio and video
Pornographic and hate sites
Interference with legitimate research and academic
use
Hacking/Security
Cost
Privacy
Web Domain Management
Libraries
License Management
Public Address Lists
Email and Appropriate Use
• Appropriate Use Policy
• Accepted Internet Use Policy
Internet acceptable use policy
Example from APU:
Azusa Pacific University's domain name (APU.EDU) and other
University computer, network, and electronic mail systems
exist for the primary purpose of transmitting and sharing
information for the University's purposes. The use of apu.edu
by any member must be consistent with the mission of Azusa
Pacific University and is subject to control by the University.
Computer, network, communications, and Internet services
exist to promote the purposes of the University. Every attempt
to protect privacy will be maintained, but observation of
traffic flow and content may be necessary at the University's
discretion for security and legal reasons. The end-user who
originates traffic will be responsible if the traffic does not
conform to this policy.
Internet acceptable use policy
User Requirements
•
Respect the privacy of others. For example, users shall not
intentionally seek information on, obtain copies of, or modify files
belonging to other users.
•
Only use your own account and password; never misrepresent
yourself as another user.
•
Respect the legal protection provided by copyright and licenses to
programs and data.
•
Respect the integrity of apu.edu so as not to interfere with or
disrupt network users, services, or equipment. Interference or
disruption includes, but is not limited to, distribution of unsolicited
advertising, propagation of computer viruses, and use of the
network to make unauthorized entry into other computational,
communications, or information devices or resources.
Internet acceptable use policy
Acceptable Uses:
•
•
•
•
Use as a vehicle for scholarly or University-related
communications
Use in applying for or administering grants or
contracts for research or instruction.
Use in activities of research or direct support for
instruction.
Use must be consistent with University standards
as defined in its publications.
Internet acceptable use policy
Unacceptable Uses:
•
Use of apu.edu or any other University computing resources
for illegal purposes.
•
Use of apu.edu or any other University computing resources
to transmit or receive threatening, obscene, or harassing
materials.
•
Sending unsolicited advertising.
•
Use for personal for-profit business is not permitted.
•
Use of the network by employees for recreational games is
not acceptable during working hours.
Internet acceptable use policy
Enforcement and Violations
Action may be taken by system management, subject to the
guidance and authority of the Internet Policy Committee, to
prevent possible unauthorized activity by temporarily
deactivating any member. Reasonable efforts will be made to
inform the member prior to disconnection and to re-establish
the connection as soon as an acceptable understanding has
been reached. Any disciplinary action deemed necessary will
be handled through the normal channels as explained and set
forth in the student catalogue, student handbook or other
materials published by the office of the Dean of Students.
P2P
http://www.acenet.edu/washington/leg
alupdate/2003/P2P.pdf
• http://www.stereophile.com/news/10
1104copyright/
Peer to Peer Policy (P2P)
For the purposes of this policy, a Peer-topeer file sharing application is any
application that transforms a personal
computer into a server that distributes
data simultaneously to other
computers.
Peer to Peer Policy (P2P)
Issues:
Copyright Infringement
Downloading or distributing copyrighted material, e.g.
documents, music, movies, videos, text, etc., without
permission from the rightful owner violates the United States
Copyright Act and several university policies. While it is true
that a number of artists have allowed their creative works to
be freely copied, those artists remain very much the
exception. It is best to assume that all works are copyrightprotected except those that explicitly state otherwise.
Peer to Peer Policy (P2P)
Impact to APU's network
A user's computer acting as a server can place an enormous
burden on APU's network(s). If the computer/server is popular
and does excessive, high-volume transfers of files, this single
computer/server can severely impact the performance of APU's
network. Imagine the impact if there are several
computers/servers functioning in the same manner. For
example, music files (MP3) are usually very large files,
between 2 and 10 MB in size, and movie files (DivX) can be
enormous, averaging 600 MB in size. Some Peer-to-Peer
applications let you choose NOT to be a server, but others,
such as Gnutella, don't. If users simply install the software and
don't take the time to read the documentation, they may not
realize that their computer is acting like a server. Make sure
you understand what the software does.
Peer to Peer Policy (P2P)
Security
Another serious problem with setting up your computer as a
server is that faculty/staff and students could be reducing the
security of their system, allowing a cracker (computer
criminal) to more easily compromise their entire computer and
gain access to private and/or University data. Furthermore,
any compromised computer on the University network
increases the potential risk to all other devices and systems
within that same security context of that network. Peer-topeer file sharing applications differ in how much security they
provide. Be cautious.
Peer to Peer Policy (P2P)
Pornography
Lastly, new reports indicate that Peerto-Peer applications are being used to
disseminate pornography. It is not
known at this time if this is done with
the authorization or knowledge of
computers/servers participating with
Peer-to-Peer applications.
Peer to Peer Policy (P2P)
Policy
It is the policy of APU that the
university's network connections may
not be used to violate copyright
laws. The unauthorized reproduction
of copyrighted materials is a serious
violation of APU's Internet Acceptable
Use Policy, as well as the U.S.
Copyright Laws.
Peer to Peer Policy (P2P)
Background Discussion of Copyright Law
and Potential Liability for Students
Engaged in P2P File Sharing on
University Networks
Peer to Peer Policy (P2P)
Electronic Privacy Information Center
http://www.epic.org/privacy/student/p
2pletter.html
Peer to Peer Policy (P2P)
What Is Higher Education Doing About
P2P?
http://www.educause.edu/asp/doclib/a
bstract.asp?ID=EDU03156
SPAM and Viruses
Spam
The first federal anti-spam legislation, the CAN-SPAM
Act of 2003, was signed into law by President
George W. Bush on December 15, 2003. The Act is
effective January 1, 2004. The Act sets rules for
commercial e-mail, although it makes no distinction
between solicited and unsolicited commercial email. Commercial e-mail is defined as "any
electronic mail message the primary purpose of
which is the commercial advertisement or
promotion of a commercial product or service
(including content on an Internet website operated
for a commercial purpose". Several states have
passed similar anti-spam legislation.
Spam
Six years after spam legislation was first introduced, the first
federal spam law was signed by President Bush on December
15, 2003. Despite this milestone, the CAN-SPAM bill remains a
"work in progress." While it includes popular provisions from
several bills, including making spamming a criminal offense, it
also calls for at least five follow-up reports to be submitted to
Congress over the next 24 months. These reports call for
continued work on such things as defining the "primary purpose
of an electronic mail message," what constitutes a
"transactional or relationship message," and what is a suitable
identifier for mail that contains sexually oriented material.
The law also calls for the Federal Trade Commission (FTC) to
submit a plan and timetable for a "do not spam" registry.
Spam laws by state
http://www.spamlaws.com/state/summ
ary.html
Proposed Policy
• Case Study
The academic cabinet of your institution has
complained to you about the large number
of “SPAM” messages being received in their
mail inboxes. You as the senior administrator
have decided that the best course of action
is to filter these messages before they are
received. What do you think should be taken
into account as you develop and implement
this policy?
Copyright
• Digital Millenium Act
http://www.loc.gov/copyright/legislat
ion/dmca.pdf
• Intellectual copyright
http://www.benedict.com/
Privacy and Security
• Auditors
• Personal Privacy
• Harassment
Policies
•
•
•
•
Network access (Wireless)
Password Management
Authentication
Authorization
Network Access
• http://apu.edu/imt/network-accesspolicy.php
• http://apu.edu/imt/network-accountpolicy.php
Security
• http://www.signonsandiego.com/news
/computing/20040317-9999news_7m17hacker.html
• GLB Act (Gramm Lilley Beech)
• Sarbanes-Oxley Act
Electronic Mail
• http://www.buys.co.za/casestudies_e
mail_failure_content.htm
• http://apu.edu/imt/electronic_mail_u
sage.php
External Legislation
US Patriot Act 2001
• In essence the Patriot Act is an
Extension of FERPA
• That allow federal agency to request
information without the consent of the
student.
• Limited liability, not tested, no
precedent.
US Patriot Act 2001
Four primary areas:
1. The privacy of student records
2. Information and Technology
3. Subpoenas and warrants
4. Environmental health and safety
Privacy of Student Records
•
•
•
•
The request must be by a US Assistant
Attorney General or higher ranking official.
It must be through a court order.
There must be a certification that there
are specific and articulable facts
supporting the request.
Institutions do not violate FERPA by
responding to such and order without
student consent.
Privacy of Student Records
•
•
•
APU does not need to make a record of
disclosure (this is an exception to the current
FERPA requirement).
APU should not be liable to any person for
good faith disclosure of educational records in
response to such and order.
There is a monitoring of foreign student
session; John Reynolds analysis is that the
new information requirements through SERVIS
(the students and exchange visitors program
information system) should cover this
information.
Information Technology Requirement
• Permit government officials to seek
stored voicemail messages without
wiretap authorization
• Requires APU communication providers
to respond to a subpoena for, long
distance, local telephone connection
records, times and duration, telephone
numbers, assigned network addresses,
means and source of payment for these
services.
Information Technology Requirement
• To provide URL records, technically
difficult for APU.
• Authorizes the government to install
devices to track internet use.
• Penalties for computer hacking crimes
have been increased and these include
accessing and transmitting or
destructive programs such as viruses.
Threshold $5000.
Subpoenas / Warrants
• A court order for educational records forces
APU, without student consent, but supported
by a court order, to provide officials with
educational records that are relevant to a
terrorism investigation.
• Subpoenas can reach beyond paper
documents and include digital information as
well as voice mail, emails, and Internet
usage.
• Allows law to intercept wire or electronic
communication that relates to terrorism and
computer fraud/abuse.
Subpoenas / Warrants
• Allows the FBI to seize with a court
order business records pursuant to
terrorism investigation.
• The patriot act does restrict APU from
disclosing that these request were ever
made.
Environmental Health and Safety
• Less relevant for APU
• 10 year imprisonment and a large fine
for possessing a biological agent toxin
or delivery system that is not
reasonably justified by research or
other peaceful purposes.
Licensing
• ACACIA
The TEACH Act
• http://www.ala.org/Template.cfm?Sec
tion=Distance_Education_and_the_TEA
CH_Act&Template=/ContentManageme
nt/ContentDisplay.cfm&ContentID=259
39
• Legislates what can be used without
copyright infringement in Distance
Education
Libel
• http://www.ilaw.com.au/public/cullen
article.html
FERPA
• http://www.geocities.com/jnsteinke/ferpa/ferpa.htm
• “There is no guarantee of confidentiality of sending
grades via the Internet. The institution would be
held responsible if an unauthorized third party
gained access, in any manner, to a student’s
education record through any electronic
transmission method. A third party in this definition
could be parents or guardians, boyfriend or
girlfriend, roommate, etc. Only secure web sites are
approved by FERPA for accessing grade
information.”
•
The Gramm-Leach-Bliley Act
• Took effect May 23, 2003, with an
extra
year to conform third-party service
provider contracts entered into prior
to
June 24, 2002.
Standard for Safeguards
• Each financial institution must develop, implement
and
maintain a comprehensive information security
program that is written in readily accessible part(s);
• The program must contain administrative, technical
and physical safeguards that are appropriate to:
1. the size and complexity of the financial institution;
2. the nature and scope of its activities; and
3. the sensitivity its customer information.
Required Elements – Each financial
institution must:
• Designate one or more employees to
coordinate its program;
• Assess risks to the security of customer
information;
• Design and implement safeguards to address
risks, and test and monitor their effectiveness
over time;
• Oversee service providers; and
• Institute a training program.
• Adjust the program to address developments.
Other ACTS
• HIPPA (Health Insurance Portability and
Accountability Act) 1996
• ECPA (Electronic Communications Protection
Act)
– Unauthorized use of interception of the contents
of any wire, oral or electronic communication.
• CFAA (Computer Fraud and Abuse Act)
– Unauthorized access to a protected computer
with intent to do data damage
Web Resources
• Azusa Pacific University
www.apu.edu/imt
• Chowan College (Murfreesboro, NC)
http://www.chowan.edu/informationtech/p
olicies/default.htm
• Columbus State University (Columbus, GA)
http://cins.colstate.edu/policies/
• Linn-Binton Community College (Albany, OR)
http://www.lbcc.cc.or.us/aup.html
Web Resources
• Portland Oregon Community College (Portland, OR)
http://www.pcc.edu/lrc/aup.htm
• South Georgia College (Douglas, GA)
http://www.sgc.peachnet.edu/ComputerCenter/policies/com
ppol.htm
• Umpqua Community College (Roseburg, OR)
http://www.umpqua.cc.or.us/library/dlibaup.htm
• University of North Carolina Greensboro (Greensboro, NC
)http://www.uncg.edu/cis/
• University of Southwestern Louisiana (Lafayette, LA)
http://www.usl.edu/InfoTech/Policies/comp_net.html
• Vanderbilt University (Nashville, TN)
http://www.vanderbilt.edu/HomePage/aup.html
Web Resources
• http://www.lectlaw.com/inll/99.htm
• Software Piracy
http://www.siia.net/piracy/education.asp
• Educational and Web Issues
http://www.agocg.ac.uk/reports/mmedia/legal/leg
al.pdf
• National Statistics
http://nces.ed.gov/pubs2004/2004011.pdf
• Internet Case Law
http://northnet.net/~midwest/0comlaw.htm
• APU Policies http://apu.edu/imt/policies.php
Questions?
Break
Internationalization
• Why do we engage in
internationalization or Globalization in
Higher Education
• Health, Safety and Security
• Globalization Framework
• APU Policies and Procedures as an
example
China – 09/04
Why?
•
•
•
•
•
Aligned with the mission
Globalization/World View
Cross-cultural experience
Knowledge creation
Non-isolation of critical and innovative
thinking
• Social Justice
• Staff mobility
• Research
What?
• Teaching and Learning
– Recruitment of international students
– Provision for overseas study
So what do we do?
• Globalization Framework (Handout)
• International Travel Committee
(Administrative)
• International Studies Council
(Academic)
• Policies and Procedures
External Compliance/Resources
• SEVIS - Student and Exchange Visitor Information
System (SEVIS)
• http://www.ice.gov/graphics/sevis/index.htm
• The Overseas Security Advisory Council (OSAC)
was established in 1985 by the U.S. Department of
State to foster the exchange of security related
information between the U.S. Government and
American private sector operating abroad.
• http://www.ds-osac.org/
So what are the issues?
• Academic integrity
–
–
–
–
Articulation
Credits
Accreditation
Library resources
• Social
– Language
– Immersion or bubble
– Housing
So what are the issues?
• Organizational
–
–
–
–
–
–
–
–
Legal (agreements, Licenses, labor etc.)
Risk (Security, waivers etc.)
Use of faculty
Financial (exchange rates, tuition etc.)
Safety
Health
Emergency Procedures
Student Policies
Online and Distance Learning
• Teaching (Pedagogy)
• Assessment
• Supporting services
APU Policies and Procedures
• International Travel Policy
• International Study Abroad Procedures
• International Missions
International Travel
•
•
•
•
•
•
It is the policy of Azusa Pacific University that all international travel by faculty, staff or
students for academic or business purposes must be approved by the International Travel
Committee.
Academic or business purposes is defined as receiving academic credit, student financial
aid assistance, or receiving financial support of university funds (operational budgets), or
representing the university in an official capacity.
Approval is for purchasing of tickets and final travel clearance. Budget and management
of international travel is determined by the supervising Academic Dean, vice president or
the university president. The procedure for approval will be maintained in the Office of
Administration and Information. Approval will not be granted for travel to countries listed
on the U.S. Department of State Current Travel Warnings List
(http://travel.state.gov/warnings_list.html)
If APU faculty, staff, or students (on APU business) are in a country when it is placed on
the U.S. Department of State Current Travel Warnings List, the President’s Cabinet will be
notified by the Office of Administration and Information. The traveler may be required to
leave the country at the discretion of the President’s Cabinet.
Appeals of non-approved requests may be sent to the President’s Cabinet through the
provost or vice president.
For international emergency situations, a comprehensive and current list of all APU
faculty, staff, and students traveling internationally will be available to the university
president through the administration and information office through the implementation
of this policy.
Web Resources
• State Travel Warnings
http://travel.state.gov/
• Safety abroad
http://www.secussa.nafsa.org/safetyabroad/d
efault.html
USC Site for Global Education
http://www.lmu.edu/globaled/ro/abstracts/a
bstract894.html
Questions?
http://Home.apu.edu/~jreynolds
Download