IPO Logo Home Search Browse About IPO Staff Links

SPECIAL FOCUS

Let Policy "Police" Computer Use

Practical, expert advice regarding computer passwords, virus protection,
security, e-mail and Internet policies and more

BY JEFF MURPHY

The estimated damage done by the "Love Bug" virus ranged from two billion to over 15 billion dollars.

Administrators are given a daunting task when asked to manage and control an organization's personal computer systems. According to Dataquest, a leading information technologies research firm, business use of personal computers (PCs) has caused shipments of computers to expand 15 percent in the first quarter of 2000 as compared to the first quarter of 1999. In the first quarter of 2000, more than 29.9 million computers have been shipped worldwide.

This growth affects every segment of business. Many more park districts and other recreation organizations are recognizing the value of a computer on every computer user's desk, and are acquiring PCs for use in their own organizations. These powerful, low- price machines with an easy-to-use Windows interface, are permitting organizations to place computers on desks that would not have been possible only a short time ago.

Along with an increased number of computers within the organization, the need for connectivity has also increased resulting in local area networks being installed. Client-server networks based on Novell NetWare or Microsoft Windows NT are the most prevalent, but more basic peer-to-peer networks can also be found. These networks provide support for e-mail systems, organization-wide software applications, Internet access, printer sharing, and many other uses.

Having a computer on everyone's desk—according to PC manufacturers and software developers—is the direction every progressive organization should be headed. While there are many benefits an organization can receive by connecting people with computers and computer networks, there are also many problems that an organization should watch out for as computer use expands into our organizations. An organization can reduce the problems they may encounter with computers by keeping users aware of some common dangers.

It is the organization's task to inform users of the proper and improper use of the computers. Listed here are some common areas that need special attention from the people responsible for the computer networks of any organization.

Passwords

The computer industry has done a very poor job in educating users of the importance of keeping their passwords to themselves. Every time I install a network, I always give my password speech. The speech reminds users that the password they have been given is theirs, and no one else should know their password. Their password protects information they place on the computer network including word processing docu-

20 / Illinois Parks and Recreation


LET POLICY -POLICE" COMPUTER USE

ments, spreadsheets, and e-mail. By not protecting their password, it would be easy for another user to log onto the network under a false identity, and send malicious e-mail across the network.

The vice president of one of my clients even told me that people in the organization laughed about my speech at lunch following one of my visits to the site. When the vice president's own private correspondence ended up in the wrong hands the laughing ended, and they took password privacy much more seriously. On both Novell NetWare and Microsoft NT Server,, the password is never displayed. A well-setup network would prompt users for a new password the first time they log in, so even network administrators would not know a user's password. If a password is forgotten, the administrator can assign a new password, and have the system prompt for a new password the next time that user logs into the network.

Data Protection

One important area of protection is a good system for backing up your data. Many organizations already have a good backup procedure in place to protect the data. One area related to data protection that is important is the user's personal documents. It is important that the organization inform the users where they should place their documents in order for them to be backed up in the normal backup procedure. It is common that an end user's local hard drive may not be backed up in the normal backup procedure.

It is important for the users to know whether or not the organization will be backing up local hard drive data. If we do not back up this data, then it is important that the end user accept responsibility to backup their own personal documents that they do not store on the network. Additionally, if your organization does not have a daily backup procedure, it is important to implement one.

It would be difficult to place a dollar value on the data that is located on your computer network, but the time and effort required to recover lost data is enough reason to spend some time and money to get the required hardware setup to assist with the backup procedure. Backup hardware that would be able to handle up to 40 gigabytes of data can be purchased for less than $1,500. Frequently, backup hardware is shipped with backup and scheduling software that works with the particular equipment purchased. After setup, the only interaction required from a user would be to change the tape, and to check the backup log.

Virus Protection

Businesses, governments and PCs worldwide were crippled in May 2000 by a computer virus affectionately called the "Love Bug" virus. This virus appeared in a user's e-mail in-box with the subject "I love you."

Computer Use and E-mail Policies

It's a good idea to have computer users within your organization read and sign an agreement that outlines the agency's stand on how computers are to be used. This agreement could be included in your regular personnel policy or be a distinct policy for computer users. A computer use policy should include five important elements.

1. Present the scope of personal use permitted on the computer.

Research shows that 90 percent of workers spend time surfing the Internet for personal reasons or pleasure. (And 85 percent of workers admit they use company e-mail for personal reasons.) It is important to establish the organization's position on personal use of the computer. If a computer in your organization has access to the network and the Internet, then your policy may be more restrictive than another whose computers have very little connectivity. There are three positions an organization can take related to personal use of computer.

• Computers and e-mail may only be used for business purposes.

Computers and e-mail may be used for incidental personal use.

• Computers and e-mail may be used for personal use without restriction.

2. Discuss the amount of monitoring the organization will perform.

Many organizations are concerned about inappropriate use of computers, especially as it relates to the Internet. Organizations should be very concerned about monitoring when the organization has e-mail, and permits users to access the Internet. There are three basic positions an organization can take related to monitoring.

• The company will perform no monitoring.

• The company will allow monitoring for any business purpose.

• The company will monitor only with good cause or under legal obligation.

3. Detail the organization's stand on data encryption.

Encryption is a technology that is used by the security-minded organization. Since many experts believe that Internet users should assume that everything that is transmitted over the Internet is viewed by someone else, an organization that is concerned about proprietary secrets and company information uses encryption to protect their data. Encryption makes monitoring more difficult, but does boost a sense of privacy and protection for the transmissions. An organization should present whether or not encryption will be used, and the reasons behind its use. Organizations that use encryption should also publicize specific situations where encryption is required and not required.

(continued on page 22)

July/August 2000 ¦ 21


SPECIAL FOCUS

Computer Use find E-mail Policies
(continued from page 21)

4. Present the organization's position on accessing user's e-mail or computer files.

Occasionally an organization may find it necessary to view e-mail or files of a user. While it may not be viewed as popular, it may be a good deterrent to inappropriate use of the computer. There are several positions an organization can take on this type of access.

• Access without consent unless required by law or duty.

• Access with good cause and following appropriate procedures.

• Access for any business purpose by those with authority.

• Access without consent with after-the-fact notification.

5. Additional topics that an organization may want to cover within its policy include the following.

Illegal Activity. No organization would like to be put in the terrible position of supporting illegal activity. Use of computers and e-mail for this purpose should carry a serious consequence.

Personal Business. Your organization doesn't want to be the technology center for an employee's fledgling business. Protect the organization by stipulating acceptable computer and e-mail use for an employee's outside interests. For example, you may want to allow an employee who teachers a college-level course to receive e-mail from his students, but prohibit the use of organization computers to design, publish and manage the employee's on-line retail Web site.

Additional Software. Occasionally a user might desire some additional software installed on their equipment. The process the user should go through to get this software approved for their computer should be specified.

Once these items are presented in the policy, the organization should also discuss remedies for violations of these policies. A variety of remedies should be stipulated in the policy, and discussing the process through which a remedy will be selected can be included. These policies exist as a tool balancing the interests of the organization and the employee.

Establishing a good policy demonstrates respect for your employee's desire for and expectations of privacy. Your policy will achieve acceptance and respect by involving employees in the development process. Remember that we don't want to implement a policy that is embarrassing to describe to your employees, or embarrassing to see described in the local paper. 

by Jeff Murphy

If the user opened the e-mail and attempted to open the attachment, a script program would execute that replicated the virus to all the people the user had in their address book. In addition to the replication, the virus would delete all graphic and sound files on a user's computer. Once the initial strain of the virus had circulated through corporate and private e-mail systems, the virus was relabeled and sent out again.

I wish computer users didn't have to worry themselves with things like viruses, but unfortunately we have to be concerned with them. The estimated damage done by the "Love Bug" virus ranged from two billion to over 15 billion dollars. The damage is difficult to measure since the effect on the user is lost productivity in addition to lost graphic and sound files that may be important.

The best way to protect your organization is to purchase and install a version of virus protection software. Since the problem of viruses has been so prevalent, many new computers ship with virus software installed. The important action that must be taken is keeping the virus software updated with the current virus list. Many virus software manufacturers allow users to download updates to their software that will protect users from newer viruses. In order to perform this update, a valid license for the virus software is required, and the means by which the download can occur must be provided.

For an organization with many computers, the best method may be to standardize a virus software package, then get the updates as needed, and distribute them across the organization. It is important to inform users about a few other steps that can be followed to protect your organization from virus-infected programs.

• First, never open attachments to e-mail from an unfamiliar source.

• Second, be aware of how viruses operate, and look for telltale signs of a virus.

• Lastly, don't download items from unfamiliar Web sites.

Internet Use and Safety

The Internet is a powerful and exciting resource and tool that is becoming more available every day. There is an incredible amount of information available to users. Even your state and national associations (Illinois Association of Park Districts, Illinois Park and Recreation Association and the National Recreation and Park Association) have gotten on the Web and provide information to their members, and the rest of the world, about the exciting world of recreation.

The Internet is valuable for sharing information, research, shopping, checking news, tracking stocks,

22 / Illinois Parks and Recreation


LET POLICY "POLICE" COMPUTER USE

gaming, and a wealth of other uses. However, the Internet is also something that can easily be abused both by people in your own organization and outside the organization. The Internet is a great diversion.

Many organizations are providing easy access to the Internet without a significant reason certain individuals in the organization would need access to the Web. The organization should communicate their reasons why the Internet is provided to users within the organization, and what proper and improper use of the Internet might be. Smart organizations will not provide Internet access to individuals without the user signing an Internet policy document stating that they understand the proper use of the Internet. (See sidebar "Computer Use and E-Mail Policies" on pages 21 and 22.)

Software Licenses

Recently, the problem of software piracy has become a big concern of software manufacturers. Microsoft is spending a significant sum of money to educate the public concerning this issue.

Every time new software is acquired for your organization, the license should be validated and stored in a safe location in the organization. The organization has a responsibility to be sure that all the software used by the organization has a valid license. Many computers are shipped with a valid license for the operating system, so the bigger problem will probably focus on the application software that is used. The organization should be aware of the valid use of the license, and communicate that to the end users.

One common misuse of a license is the concept that software can be loaded both at a user's desk at work, and then also copied onto their home computer. Actually, this is a violation of most software licenses. Another licensing concern for an organization is software brought in by an employee and installed on their local hard drive without the organization's knowledge or approval. The best way to prevent license abuse is to purchase software through reputable sources. There are many in the area, and many have municipal government pricing available.

The key to having a computer system that continues to be functional and available is communication. The people responsible for the computer systems need to communicate with their users concerning the issues discussed here.

There are many creative ways to keep reminding your users about these important issues. Start an e-mail newsletter to your users discussing these issues and other issues important to your park district. Begin a "Computer Tip of the Week" publication, in which you remind users of the importance of safe use of their computers. Include a discussion of these issues in your organization's employee policy manual.

These and many other ways will open up important discussion related to computer issues for your organization. 

JEFF MURPHY

is a software developer for Lord & Murphy, Inc. and has been developing software and designing computer systems for park district and municipal governments for more than 12 years, lord & Murphy offers a complete line of software for park districts and municipal governments. Contact Murphy at jmurphy@lordandmurphy.com.

Valuable Well Sites

www.symantec.com/avcenter
At Symantec software's computer virus research center, visit the virus research center for the latest information regarding viruses.

www.cdw.com
Check here for computer software and supplies on-line.

www.microsoft.com
Lots of information here about software products used on many computers.

www.ILparks.org
See the Illinois Association of Park Districts Web site for links to other recreation organizations as well as legislative advocacy and grant information.

www.il-ipra.org
See the Illinois Park and Recreation Association Web site for links and association information.

compiled, (by Jeff Murphy)

July/August 2000 ¦ 23


|Home| |Search| |Back to Periodicals Available| |Table of Contents| |Back to Illinois Parks & Recreaction 2000|
Illinois Periodicals Online (IPO) is a digital imaging project at the Northern Illinois University Libraries funded by the Illinois State Library
Sam S. Manivong, Illinois Periodicals Online Coordinator