skip to main content
10.1145/99186.99222acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article
Free Access

Developing a computing & information policy

Authors Info & Claims
Published:01 August 1990Publication History

ABSTRACT

The growth and expansion of information technologies on campuses across the country has caused many universities to begin to develop (or modify existing) information policies. Questions concerning moral, ethical, and legal obligations have arisen which in the past have been overlooked or not even considered. Lehigh having implemented a campus-wide information system which is used by over 90% of the campus has had to develop an Information Policy to address the growing concerns on campus relating to the appropriateness of publicly available electronic information.

Lehigh's Information System allows individuals to post information without any filtering to both on-campus and off-campus messaging systems. While these facilities are very useful, they have raised serious concerns relating to system resource management, possible legal liabilities concerning the nature of the information, and also the placement of materials that are obscene and offensive. The following issues relating to the development of Lehigh's Information Policy are discussed: possible legal liabilities, censorship, resource management, information ownership, user responsibilities, and approval chain.

References

  1. 1.T. Foley & M. Newman, "An Empirical Study of User Satisfaction with a Microcomputer-Based Campuswide Information System" Proceedings of ACM SiGUCCS User Services Conference XVI, pp. 91-100, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.13. Meeks, "As BBSes Mature, Liability Becomes and Issue" INFOWORLD, Volume 12, Issue 4 Jan. 22, 1990, pp. 14-15Google ScholarGoogle Scholar
  3. 3.j. Wallace & R. Morrison, SYSLAW (LLM Press, NY, 1988)Google ScholarGoogle Scholar

Index Terms

  1. Developing a computing & information policy

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SIGUCCS '90: Proceedings of the 18th annual ACM SIGUCCS conference on User services
                August 1990
                447 pages
                ISBN:0897914066
                DOI:10.1145/99186

                Copyright © 1990 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 August 1990

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate123of170submissions,72%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader