ABSTRACT
The growth and expansion of information technologies on campuses across the country has caused many universities to begin to develop (or modify existing) information policies. Questions concerning moral, ethical, and legal obligations have arisen which in the past have been overlooked or not even considered. Lehigh having implemented a campus-wide information system which is used by over 90% of the campus has had to develop an Information Policy to address the growing concerns on campus relating to the appropriateness of publicly available electronic information.
Lehigh's Information System allows individuals to post information without any filtering to both on-campus and off-campus messaging systems. While these facilities are very useful, they have raised serious concerns relating to system resource management, possible legal liabilities concerning the nature of the information, and also the placement of materials that are obscene and offensive. The following issues relating to the development of Lehigh's Information Policy are discussed: possible legal liabilities, censorship, resource management, information ownership, user responsibilities, and approval chain.
- 1.T. Foley & M. Newman, "An Empirical Study of User Satisfaction with a Microcomputer-Based Campuswide Information System" Proceedings of ACM SiGUCCS User Services Conference XVI, pp. 91-100, 1988. Google ScholarDigital Library
- 2.13. Meeks, "As BBSes Mature, Liability Becomes and Issue" INFOWORLD, Volume 12, Issue 4 Jan. 22, 1990, pp. 14-15Google Scholar
- 3.j. Wallace & R. Morrison, SYSLAW (LLM Press, NY, 1988)Google Scholar
Index Terms
- Developing a computing & information policy
Recommendations
The Privatization of Information Policy
AbstractCopyright law in recent years has undergone a process of privatization. While weakening the enforceability of conventional legislation (copyright rules), cyberspace facilitates alternative types of regulation such as contracts and technical self-...
Developing an Information Security Policy: A Case Study Approach
AbstractOrganisational information and data must be protected from active and passive attacks and secured from illegal access, unwanted interruption, unauthorised alteration or annihilation. Many organisations fall victim to such attacks due to weak ...
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce
PEARC '17: Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and ImpactThe need for college graduates with high-performance computing (HPC) skills is rapidly increasing with the greater interest in tasks requiring big data processing. Major needs in medicine, geosciences, and data analytics, among other disciplines, drive ...
Comments