{"id":4289,"date":"2018-05-20T11:27:39","date_gmt":"2018-05-20T15:27:39","guid":{"rendered":"https:\/\/umaine.edu\/it\/?page_id=4289"},"modified":"2021-02-24T09:51:07","modified_gmt":"2021-02-24T14:51:07","slug":"uad-privacy-concerns","status":"publish","type":"page","link":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/","title":{"rendered":"UAD User Privacy and Monitoring Concerns"},"content":{"rendered":"<h3><\/h3>\n<h3>Will this client software monitor my activities?<\/h3>\n<p>No, these software packages are used to manage computers, not collect data on user activities.\u00a0 Modern computers automatically log many system events such as software and update installations, logins and system errors.\u00a0 We use these logs to narrow down the source of computer issues and monitor for security intrusions.\u00a0 These logs do not include user activity such as websites visited, files edited, etc.<\/p>\n<p>&nbsp;<\/p>\n<h3>Are there situations where IT staff may monitor the data, files or other activities on my computer?<\/h3>\n<p>US:IT staff are committed to maintaining the privacy and security of user data, files, and activities.<\/p>\n<p>IT staff may need to access personal data or files in order to resolve technical issues reported by the computer\u2019s user.\u00a0 However, IT staff will coordinate such activities with the user.\u00a0\u00a0 IT staff may need to access a computer for security reasons, such as a security incident. .\u00a0 Also, when replacing or upgrading a computer. IT staff may have access to user files for the purpose of transferring the files to the new computer.<\/p>\n<p>The University sometimes has legitimate needs to access files on University-owned computers and cannot guarantee privacy. Appropriate purposes to access files include, but are not limited to maintaining student and course records, investigating data breaches, investigating violations of law, responding to public records requests in accordance with Maine law, federal Family Educational Rights and Privacy Act of 1974 requirements, litigation holds, subpoenas, addressing evidence of misconduct and other legal requirements.<\/p>\n<p>What safeguards exist to ensure that the University does not unnecessarily access a user\u2019s computer files, data, etc.?<\/p>\n<p>All university IT staff are required to sign the\u00a0 <u><a href=\"https:\/\/docs.google.com\/document\/d\/1ILi9i99Li_XEgrtLk8-XEk0fzczAwHP5heXl6qvoRU0\/edit\">IT Staff Confidentiality Agreement<\/a><\/u>\u00a0 IT staff who violate this agreement, or other data privacy rules, are subject to disciplinary action.<\/p>\n<p>In addition, the AFUM contract lays out and acknowledges the mutual interests and responsibilities related to the confidentiality and privacy of faculty information and files.<\/p>\n<p><u><a href=\"http:\/\/staticweb.maine.edu\/wp-content\/uploads\/2013\/08\/AFUM_2015-2017.pdf?565a1d\">http:\/\/staticweb.maine.edu\/wp-content\/uploads\/2013\/08\/AFUM_2015-2017.pdf?565a1d<\/a><\/u><\/p>\n<p>Top of Page 5<\/p>\n<p>M.1. The Association and the University mutually agree that files may contain materials to which unit members have privacy and intellectual property rights, to the extent provided in this Agreement, with the benefit, and subject to the provisions, of all applicable State and Federal laws. Files include, without limitations, paper files, electronic files, email, course files, creative works and personal files maintained in a University office or computer network or system, as well as University files maintained in a home office or personal computer or network. The University shall use good faith and customary efforts to safeguard the privacy and intellectual property rights of Unit members in accordance with this Agreement, including without limitation, Article 2, this Article, and any University policies related to information technology, intellectual property, applicable administrative practice letters, and to the extent provided by law. Cooperation between the Association, Unit members, and the University is essential for the implementation of these provisions.<\/p>\n<p>&nbsp;<\/p>\n<p>M.2. The Association, Unit members, and the University mutually agree that the University has legitimate needs to access files and that the University cannot assure privacy. Appropriate purposes to access files include, but are not limited to maintaining student and course records, investigating data breaches, investigating violations of law, responding to public records requests in accordance with Maine law, federal Family Educational Rights and Privacy Act of 1974 requirements, litigation holds, subpoenas, addressing evidence of misconduct and other legal requirements. The University shall not capriciously, unreasonably, or unnecessarily access files that contain information about or are created or maintained by a Unit member. Nothing within this section prevents the University from taking necessary actions to protect its systems and data from malicious or inappropriate files or activity.<\/p>\n<p>&nbsp;<\/p>\n<h3>May I remove the SCCM or JAMF software from my university-owned computer?<\/h3>\n<p>No, not without written permission from US:IT.\u00a0 The Board of Trustees, Information Security Policy section 4.1.3, prohibits the removal of software installed by the University for legitimate computer management purposes, or the modification, without permission, of security settings and features.<\/p>\n<p><u><a href=\"https:\/\/www.maine.edu\/information-technology\/wp-content\/uploads\/sites\/22\/2021\/01\/Acceptable-Use-APL-VI-H-June-2020.pdf\">Acceptable Use of Information Resources<\/a><\/u><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Will this client software monitor my activities? No, these software packages are used to manage computers, not collect data on user activities.\u00a0 Modern computers automatically log many system events such as software and update installations, logins and system errors.\u00a0 We use these logs to narrow down the source of computer issues and monitor for security [&hellip;]<\/p>\n","protected":false},"author":1190,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-4289","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UAD User Privacy and Monitoring Concerns - Information Technology - University of Maine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UAD User Privacy and Monitoring Concerns - Information Technology - University of Maine\" \/>\n<meta property=\"og:description\" content=\"Will this client software monitor my activities? No, these software packages are used to manage computers, not collect data on user activities.\u00a0 Modern computers automatically log many system events such as software and update installations, logins and system errors.\u00a0 We use these logs to narrow down the source of computer issues and monitor for security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T14:51:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/\",\"url\":\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/\",\"name\":\"UAD User Privacy and Monitoring Concerns - Information Technology - University of Maine\",\"isPartOf\":{\"@id\":\"https:\/\/umaine.edu\/it\/#website\"},\"datePublished\":\"2018-05-20T15:27:39+00:00\",\"dateModified\":\"2021-02-24T14:51:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/umaine.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UAD User Privacy and Monitoring Concerns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/umaine.edu\/it\/#website\",\"url\":\"https:\/\/umaine.edu\/it\/\",\"name\":\"Information Technology\",\"description\":\"Just another University of Maine Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/umaine.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UAD User Privacy and Monitoring Concerns - Information Technology - University of Maine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/","og_locale":"en_US","og_type":"article","og_title":"UAD User Privacy and Monitoring Concerns - Information Technology - University of Maine","og_description":"Will this client software monitor my activities? No, these software packages are used to manage computers, not collect data on user activities.\u00a0 Modern computers automatically log many system events such as software and update installations, logins and system errors.\u00a0 We use these logs to narrow down the source of computer issues and monitor for security [&hellip;]","og_url":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/","og_site_name":"Information Technology","article_modified_time":"2021-02-24T14:51:07+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/","url":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/","name":"UAD User Privacy and Monitoring Concerns - Information Technology - University of Maine","isPartOf":{"@id":"https:\/\/umaine.edu\/it\/#website"},"datePublished":"2018-05-20T15:27:39+00:00","dateModified":"2021-02-24T14:51:07+00:00","breadcrumb":{"@id":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/umaine.edu\/it\/uad-privacy-concerns\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/umaine.edu\/it\/uad-privacy-concerns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/umaine.edu\/it\/"},{"@type":"ListItem","position":2,"name":"UAD User Privacy and Monitoring Concerns"}]},{"@type":"WebSite","@id":"https:\/\/umaine.edu\/it\/#website","url":"https:\/\/umaine.edu\/it\/","name":"Information Technology","description":"Just another University of Maine Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/umaine.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"","author_link":"https:\/\/umaine.edu\/it\/author\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/pages\/4289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/users\/1190"}],"replies":[{"embeddable":true,"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/comments?post=4289"}],"version-history":[{"count":6,"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/pages\/4289\/revisions"}],"predecessor-version":[{"id":5563,"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/pages\/4289\/revisions\/5563"}],"wp:attachment":[{"href":"https:\/\/umaine.edu\/it\/wp-json\/wp\/v2\/media?parent=4289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}