Policies

// By Samantha Isabelle Beaumont // // Last Updated: 20 October 2010 //
 * Policies **

''Policies are __enforceable measures__ intended to __promote appropriate__ and __discourage inappropriate use__ relating to information technologies. They can be __developed by governments, businesses, private groups or individuals__. They normally __consist of rules governing access to, or use of, information, hardware, software and networks__. For example: A school policy on the use of IT would consist of each user signing an acceptable use policy. It would also __address unlawful access to the network__ through, for example, identity theft, or using hacking software and __how these transgressions would be treated__. Many websites also __require users to agree to specific policies before allowing access to their services__.

Policies also __affect the exchange of information__. For example: By making it __subject to copyright laws__ and __raising people’s awareness of plagiarism__. In general, policies can __promote or restrict access, guide behaviour__, require the __fulfilment of certain conditions prior or during use__, or need to be developed to address unforeseen issues such as cyber-bullying’’ - //(ITGS Guide 2010)//



**__ POLICIES: __**

__ What? __ In Information Technology terms; a Policy is basically a **set of rules**, or a strict guideline as to **how** to use a network, software, hardware or even program applications within its jurisdiction. It is usually enforced by the owner or manager of an area or company. It **outlines the ’acceptable use’** of what the policy applies too.

// Policies usually consist of: //

· ** Rights of Access: **  o Outlines who has access to which sets of data; Who should have the only rights to access certain confidential information and who can alter that data. · ** Guidelines: **  o What is acceptable and what is unacceptable use of the network  o Consequences to what happens to an individual if the rules are breached  o Who can access and alter confidential information  o How to send confidential information  o How to present confidential documents  § ** Security: **  · Passwords, usernames and unique codes for basic logon requirements or access to certain confidential databases



__ When? __ Policies are generally applied at the **very beginning of the creation of a computer system** and the collaboration or addition of its resources and applications. Furthermore, it is then always referred back to and present every time the system is used. As said earlier, policies are there for rules, thus, **they are ‘never not there’.**



__ Who? __ Policies are developed by **entities, governments, groups or individuals** who wish others to follow a set of principles within the area of Information Communications Technology.

They are aimed at users of computer networks and its facilities.



__ How? __ Policies are usually enforced by **making the users of a network or computer system agree to a contract, such as copyright law, prior to primary use**. For example, The JESS IT department make it compulsory for most if not all students’ sign to a ‘user agreement policy’. This outlines what you can and cannot do on the school network or computers, I.e. Msn, Facebook and Hotmail are strictly prohibited to access within the school network.

Additionally, usually entities have to train their employees appropriately so that they understand the basic uses of the network, and why it is important to use it correctly.



__ Why? __ Policies are made to **prevent the ‘inappropriate use’** of computers and their capabilities. Without them, people are at risk of dangers such as ‘identity theft’. Also, without policies, individuals are in danger of plagiarism. For example, the IB Diploma programme has a strict policy which **outlines** three main ‘**areas’** in which **candidates are forbidden to enter**:

1. **Plagiarism**; The act of unauthorised use of another person’s work and passing it off as your own 2. **Collusion**; The collaboration of yourself and another classmate[s] work. I.e. ‘’Group work’’ 3. **Duplication Of Work**; Presenting a piece of work twice. I.e. Passing off a project which has been done for a subject class, then also passing it off as a project for CAS.

Moreover, even with policies around there are major cases of Cyber bullying all over the Internet.

** Cyber Bullying Statistics: **

‘’From the National Crime Prevention Centre:

• Over 40% of all teenagers with Internet access have reported being bullied online. • Girls are more likely than boys to be the target of cyber bullying. • The National Crime Prevention Centre study found that only 10% of those kids who were bullied told their parents about the incident, and that only 18% of the cases were reported to a local or national law enforcement agency. • Only 15% of parents are “in the know” about their kids’ social networking habits, and how these behaviours can lead to cyber bullying. • Currently, the most common virtual locations for cyber bullying are chat rooms, social networking web sites, email and instant message systems. • Social networking sites such as Facebook and MySpace are growing fast, and so are the cyber bullying incidents originating from them. Experts believe that they will soon overtake chat rooms as the top source of cyber bullying problems worldwide. • 58% of 4th through 8th graders reported having mean or cruel things said to them online. 53% said that they have said mean or hurtful things to others while online. 42% of those studied said that they had been “bullied online”, but almost 60% have never told their parents about the incident. • Cell phone cameras and digital cameras are a growing problem in the cyber bullying world.

A recent survey found that 10% of 770 young people surveyed were made to feel “threatened, embarrassed or uncomfortable” by a photo taken of them using a cell-phone camera.

**The fastest growing problems within the world of cyber bullying are:**

o Stealing an individual’s name and password to a social networking site, then using their profile to post rumours, gossip or other damaging information. o Altering photographs using Photo Shop or other photo editing software in order to humiliate the individual. o Recording conversations without the individual’s knowledge or consent, then posting the call online. o Creating confrontational and mean-spirited online polls about the individual and posting them on different web sites. o Using web sites and blogs to post hurtful, embarrassing information about another individual.’’ –//(// // [] //// ) // Furthermore, Identity theft is a major threat now, in the 21st century, with the increased advancement in technology and its capabilities.

** Articles: ** 1. [] – Increasing risk of Mobile phone ID Fraud 2. [] – Bosses who are most at risk 3. [] – Stealing identities through facebook

** Videos: ** 1. media type="youtube" key="g0a6yo2ya3Q?fs=1" height="385" width="640" An explanation as to what Identity theft really is

2. media type="youtube" key="zBheC5afBfc?fs=1" height="385" width="640" What Identity theft is and how to prevent it

** Other Links: ** 1. [] - identity theft articles