6.0 Special Approval for European Union (EU) Users
Due to privacy concerns within the EU, special approvals and consents from the 1836 Technologies Personnel must be undertaken before a deep packet inspection is started. 1836 Technologies ITS will first ask the affected 1836 Technologies Personnel permission to conduct a further analysis of their packet payloads to determine the cause of the alert. The user will then be informed of their options, and if they agree to the inspection, they will be required to complete the attached EU Consent Form. If the user consents to ITS inspecting the packet payload, ITS will then examine the packets captured. If the user denies ITS’ request, the user may be disconnected from the 1836 Technologies Network if it is determined that his/her computer will continue to pose a risk to the 1836 Technologies Network.
7.0 Definitions
Hacking Sites - Sites that provide content about breaking or subverting computer security controls.
Incident - A reported security event or group of events that has proven to be a verified information technology security breach. An incident may also be an identified violation or imminent threat of violation of information technology security policies, or a threat to the security of system assets. Some examples of possible information technology security incidents are, but are not limited to:
Internet - an unclassified electronic communications network that connects computer networks and organizational computer facilities around the world.
Internet Filtering – Using technology that monitors each instance of communication between devices on the corporate network and the Internet and blocks traffic that matches specific rules.
Intrusion detection - The process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices.
IP Address – Unique network address assigned to each device to allow it to communicate with other devices on the network or Internet.
Peer to Peer File Sharing – Services or protocols such as BitTorrent and Kazaa that allow Internet connected hosts to make files available to or download files from other hosts. Social Networking Services – Internet sites such as Myspace and Facebook that allow users to post content, chat, and interact in online communities.
Phishing – attempting to fraudulently acquire sensitive information by masquerading as a trusted entity in an electronic communication.
SMTP – Simple Mail Transfer Protocol. The Internet Protocol that facilitates the exchange of mail messages between Internet mail servers.
SPAM – Unsolicited Internet Email.
User ID – User Name or other identifier used when an associate logs into the corporate network.
|