COMPUTER AND NETWORK SYSTEM ADMINISTRATION Summer 1996 - Lesson 30 Policy and Politics Types of written policies recommended: A. Usage Policy - Users' rights and responsibilities B. Administrator's Policy - Administrators' rights and responsibilities - a contract between the administrators and their bosses C. Resources Policy - who can get an account - what resources are available for each class of users - what resource quotas are implemented - when does an account terminate (normal) Types of written procedures recommended: A. Procedure for dealing with abuse of usage policy B. Procedures for system maintenance - backups - software installation - workstation installation C. Procedures for lab assistants Legal issues affecting policy decisions A. Not much case law yet 1. many legal questions undecided 2. you don't want to be a test case B. Best advice from USENIX law workshop: If you know about a violation of the law and/or policy you are obligated to take "reasonable action" to stop it. 1. you don't have much choice about the laws but you need to be aware of which ones may affect you - Federal Communications Privacy Act - Computer Fraud and Abuse Act - Florida Statute 8.... - State and Federal pornography laws - Recent Communications Decency Act 2. policies to read - at FSU, the student and faculty handbooks - the FSU Computer Usage Policy (at www.fsu.edu) - your department's policy C. Writing a policy 1. very difficult 2. the problem is that there are conflicting legitimate issues - security vs. privacy > can you read a user's e-mail if you suspect that they have broken security? - security vs. convenience > increasing the search space for passwords makes users upset > limiting ftp or login services to certain machines is inconvenient 3. the SA must perform a balancing act - on one side you will be blamed if the system gets broken into and trashed - on the other side you will be derided for making life inconvenient if you tighten up security too much - on one side you might be fired, sued, or charged if your site turns into a child pornography repository - on the other hand you might be fired or sued if you invade the privacy of users' files to look for pornography D. Discussion of War Stories 1. Boss's mistake #1 - boss asked sysadmin to edit mailboxes to take out mistake email; sysadmin did so, but only after getting boss to tell folks the sysadmin was asked to trim mailboxes (page 735). 2. Bill must die! - An unsuspecting student left himsel logged in and a malicious user used the open terminal to send threatening email to the President - thanks to the quick work of the sysadm, the student was exonerated (page 740).