Computer Use and Copyright Policy
Policy: Computer Use & Copyright Policy Category & Information Technology Policies
Subject: This policy prohibits individuals from accessing or attempting to access any account, file, and/or software for which they do not have specific authorization.
Office Responsible for Review of this Policy: Partners of Mission Group Live, LLC
Related DMW Policies: Data Classification Policy, IT Security Policy
Policy: Computer Use & Copyright Policy Category & Information Technology Policies
Subject: This policy prohibits individuals from accessing or attempting to access any account, file, and/or software for which they do not have specific authorization.
Office Responsible for Review of this Policy: Partners of Mission Group Live, LLC
Related DMW Policies: Data Classification Policy, IT Security Policy
Digital Nomads World is voice search functional through
Amazon Alexa, Google Assistant, and Apple Siri - Try It!
Digital Nomads World is voice search functional through
Amazon Alexa, Google Assistant, and Apple Siri - Try It!
I. SCOPE
I. SCOPE
All DMW staff, and registered attendees and exhibitors and speakers are given computing and network access privileges. Each person is assigned a computer account code (user ID or user name) that provides access to Digital Nomads World computing resources and systems for instructional, research, and administrative purposes. Access to these resources is a privilege, not a right. Resources include networks, office systems, and software licensed by the Mission Group Live, LLC / DBA Digital Nomads World or its agents for use on systems.
II. POLICY STATEMENT
II. POLICY STATEMENT
Because the entire DMW community relies upon computing resources and systems to use and store important and confidential data, including software and computer programs, it is morally wrong and strictly prohibited for individuals to access or attempt to access or view any account, file, and/or software for which they do not have specific authorization. Also, it is prohibited to disrupt, delay, endanger, or expose someone's work or Digital Nomads World event Pre-Show, Live and Post Show operations.
III. POLICY
III. POLICY
Notice and Take-Down ProceduresProhibited actions under this policy, include, but are not limited to, the following:
- providing computer access to unauthorized persons (e.g., by loaning your account to someone else or disclosing someone's password to a third party);
- disrupting access to a computer system, network, or files(e.g., by crashing a public system; releasing viruses; attempting to learn or alter someone's password; tying up computer resources, printers or operating systems; or using computer systems for illegal activities);
- accessing or changing someone's files with out permission;
- downloading or uploading unauthorized copyrighted materials or any material that infringes on any third party intellectual property rights;
- using email, messaging services, or any electronic communication service to harass, stalk or intimidate another person (e.g., by broadcasting unsolicited messages, repeatedly sending unwanted mail, or using another individuals' name or user name);
- intentionally wasting resources;
- using the network to violate any university policy or commit a criminal offense or to encourage conduct that would constitute a criminal offense, or otherwise violate any local, state, Federal, or international law or regulation, including, but not limited to, export control laws and regulations governing the transmission or retransmission of technical data from the United States;
- using an Digital Nomads World / Subcontractor computer system or network to make publicly available any sensitive personal information of another person without that person’s consent (sensitive personal information includes but is not limited to ID, social security numbers, and credit card numbers);
- Using the network to upload, post, e-mail, or otherwise transmit any unsolicited commercial advertising, non-Digital Nomads World related promotional materials, or other forms of inappropriate solicitation to other users including, without limitation, "junk mail," "spam," "chain letters," or "pyramid schemes";
- interfering with or disrupting the Digital Nomads World websites or servers or networks connected to DNW / Mission Group Live. LLC or violating any requirements, procedures, policies, or regulations of networks connected to DNW and Mission Group Live, LLC.
- uploading or transmitting information or material that contains virus, or other harmful content.
- refrain from using DNW resources for commercial purposes or for personal financial or other gain.
- computing accounts are provided to assist in DNW / MGL related work only. No commercial activity is permitted unless approved in advance and in writing by Digital Nomads World - Partners Information Technology.
Violations and Sanctions
Violations of this policy will be adjudicated by appropriate processes and may result in the following sanctions:
- temporaryorpermanentlossofaccessprivileges;
- Washington, DC judicial codes or staff behavioral codes, including dismissal or termination from the Walter E. Washington Convention Center
- monetary reimbursement to the DNW / MGL or other appropriate sources;
- prosecution under applicable civil or criminal laws (violations of local, state and federal law may be referred to the appropriate authorities).
- DNW will take any action that in its sole discretion is necessary to investigate and address violations of this policy, including temporarily or permanently terminating computer use privileges pending the outcome of an investigation or a finding that this policy has been violated.
Network Security
In order to provide secure electronic communications, the DNW must protect the physical and logical integrity of its networks, systems, data, and software. Some potential security threats include unauthorized intrusions, malicious misuse, and inadvertent compromise.
Each account is assigned to a single individual, who is responsible for all computer / website usage under that account. Any attempt to circumvent or subvert system or network security measures is prohibited. In the event of alleged or detected prohibited activities, the DNW will pursue the owner of the account. Individual passwords should be kept secret, not shared, and changed periodically to prevent unauthorized access.
Privacy
As a matter of course, DNW / subcontractor IT staff do not look into private, individual accounts and data. However, the DNW reserves the right to view or scan any file or software stored on systems or transmitted over DNW networks. This will be done periodically to verify that software and hardware are working correctly, to look for particular kinds of data or software (such as computer viruses), or to audit the use of resources. Policy violations discovered in this process will be acted upon.
Electronic mail and messages sent through computer networks, including the Internet, may not be confidential while in transit or on the destination computer system. Any data on DNW computing systems may be copied to backup devices periodically. IT will make reasonable efforts to maintain confidentiality, but individuals may wish to encrypt their data. If unsupported encryption software is used, the individual is responsible for remembering the encryption keys. Once data is encrypted, IT staff will be unable to help recover it should the key be forgotten or lost.
Copyright
DNW / MGL respects the rights of copyright owners, their agents, and representatives and is committed to implementing procedures and policies to support their rights without infringing on legal use of those materials by individuals. Legal use can include, but is not limited to, ownership, license or permission, and fair use under the U.S. copyright law.
Users of DNW computer resources and systems are also prohibited from making or using illegal copies of copyrighted materials or software, storing such copies on systems, or transmitting them over networks. Any misappropriation of intellectual property may be grounds for disciplinary actions. Such misappropriations include plagiarism, invasion of privacy, unauthorized access, trade secret and copyright violations, violations of federal, state or local laws, and regulations and policies that are specific to computers and networks.
Notice and Take-Down Procedures
A. DesignatedAgent
In accordance with the Digital Millennium Copyright Act (DMCA), Digital Nomads World has designated an agent to receive notification of alleged copyright infringement occurring on web pages or computer servers. For suspicions of copyrighted infringement on a DNW page or server, you may notify the DNW/ MGL Designated Agent for complaints under the DMCA:
Contant inför here
Chief Information Security Officer Office of Information Technology
A. Karen Varrone & Angelo Robert Varrone
B. ComplaintNoticeProceduresforCopyrightOwners
DMCA requires that all notices of alleged copyright infringement be in writing and inform the Designated Agent of the following:
- identify the work that was allegedly infringed;
- describe the allegedly infringed work and provide sufficient information to identify the location of the infringement;
- state that you have a good faith belief that the use of the work in the manner complained of is not authorized by the copyright owner, the owner's agent, or the law;
- certify that the information you provided is accurate and that you attest under penalty of perjury that you are authorized to enforce the copyrights that you allege were infringed;
- provideyourcontactinformation,whichincludesanaddress,telephone number, and e-mail address; and
- include your physical or electronic signature.
C. Take-downProceduresofAllegedInfringingWork
When properly notified of the alleged copyright infringement, the Designated Agent will send the information to university IT. IT will determine whether the alleged infringing work exists as described. IT will notify the user to take down the existing alleged infringing material and disable access to avoid continuing the alleged infringement. Once the user has notified IT that the infringing material has been removed from his/her computer and stated they have reviewed this policy, the user's access will be reinstated.
D. Sanctions
Individuals who have been found to infringe copyrighted materials on the network are subject to disciplinary proceedings under the Computer Use and Copyright Policy,