Location of Repository

The Use of Firewalls in an Academic Environment JTAP-631

By Tim Chown Jon, Jon Read and David Deroure

Abstract

this document) remain the same. 12. The Data Protection Act 1998 requires all personal data to be held under a reasonable level of security. That may include data encryption but also the selective blocking of access to certain network servers or subnetworks. It is a site's responsibility to decide what information needs protecting, and to what level the site will protect that information. 13. Many police forces throughout the UK are now addressing IT issues. The popular press tends to cover the more sensational pornography-related cases. While these may be a cause of embarrassment to a site, there is also a corporate liability under which sites should be able to identify individuals carrying out illegal acts over a network. This is difficult from nonauthenticated access points. While in some cases no law may have been broken by the site from which an incident originated, if the site can be shown to have acted negligently in a civil court it may be liable for a fine or compensation. Thus some method of outbound authentication may be required. Recommendations for institutions and the JISC can be found at the conclusion of the report.

Year: 2007
OAI identifier: oai:CiteSeerX.psu:10.1.1.36.4166
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.bib.ecs.soton.ac.uk... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.