![]() |
![]() |
||
|
|
Ways To Prevent AbuseYou can take specific actions to protect yourself from Internet and email abuse. Please review the suggestions below. Safeguard Your PasswordProtecting your password is the single most important thing you can do to secure your computer account. Most people are careful to protect the PIN numbers for their ATM and credit cards. Your computer account deserves the same level of protection. Here are a few tips for protecting your password:
Beware of Phishing and Spear Phishing AttemptsBe aware of phishing messages, which are unsolicited e-mail messages appearing to come from a legitimate company that ask for your login and password and/or other personally identifiable information (PII). A typical phishing e-mail gives you a phony reason, such as a security breach, survey, or contest, to trick you into providing your personal information. Spear phishing is targeted phishing in which the messages are directed to a specific organization or group; e.g., staff, student groups, etc. Spear phishing messages appear to come from a trusted source, like the IT department or human resources. If you think the information in the phishing or spear phishing email is important or otherwise useful, verify the information independently. No reputable financial institution will ask you to submit your login, password, or credit card information through email or a link in email. If you receive an email that appears to be from your bank or credit card company, call the 800-number on the back of your bank or credit card and verify. If you have a question about a phishing message that you receive, send a copy of the message with full headers to abuse@virginia.edu, and ask the Abuse Team to help you determine if the information provided in the message is legitimate. Do not reply to the sender, or click on any links in these messages. Do not open any attachments, as they may contain viruses or other malware. You might also check the ITC Security Alerts and Warnings page to see if the message has been reported. Never "Share" AccountsDo not let anyone, even a trusted friend or family member, use your computer account. Remember that under University policies, the owner of a computer account is responsible for the use of that account. Beware "Shoulder Surfers"In public computing environments -- computer labs, classrooms or an office workstation -- stay alert for "shoulder surfers" whenever you must enter in a password. If someone is helping you with a problem, ask them to look the other way while you enter your password into the computer. Stay alert in public computing facilities, and remember to protect your password! Sign-off Before Leaving a Workstation UnattendedIn public computing environments, always sign-off/log-off of your computer account(s) before you leave the workstation unattended. You may only be gone for five or ten minutes, but during this break someone could sit down at your workstation, and use your account. They could even change your password while you're gone, and you wouldn't know until the next time you tried to access your account. Make Backup Copies of Important DataYou should routinely make back-up copies of all your important work. Having a secure back-up minimizes the impact of a hardware/software problem, as well as the damage caused by Internet abuse. Use Virus Protection SoftwareThe spread of computer viruses are a common problem on most college campuses. Regularly update virus protection software on your personal computer and schedule scans. Scan also any computer files you receive on disk or through email. Even if you trust the source, it will not hurt to check for viruses or malware. Never start a program if you don't know where it came from, or who sent it to you. Be Smart about E-RelationshipsComputer-mediated communication is one of the most exciting aspects of interacting in cyberspace, but remember this is not like any other form of communication. The people you meet online through social networking websites, gaming environments, or other virtual locations don't always tell the truth about their real identity. Be careful about revealing any personal information to the faceless people you meet on the Internet. Remember, too, that cultural values can unintentionally clash in this environment; for example, what one person considers polite, another may take as an indication for a more intimate relationship. Note that playing online games or clicking on links in social networking sites can also put your personal information at risk. Click here for tips on social networking safety. Think Twice Before Taking ActionAlways think twice before you take any action someone else might consider to be abuse of the Internet and/or University computing resources. Remember that electronic communication doesn't include the non-verbal signals we take for granted in face-to-face conversations. An e-mail or social networking message may not be understood the way you intended. If you're angry or upset, sending anonymous threats, forged messages, or cyber-bullying, to name a few, are not appropriate responses. These acts are violations of University policies. What starts out as a "harmless" prank may turn out to be more serious than you realize, so think twice before you act. Report Unusual/Suspicious ActivityEven if you take all precautions, your account may still become involved in an abuse situation. If you begin receiving unusual messages from complete strangers, or if you notice changes to your web pages you don't remember making, or any other suspicious activity, don't hesitate to call the UVa Help Desk or send an email message to the Abuse Team. For more information on reporting possible abuse, be sure to read "How to Report Abuse." Be Aware of Your ResponsibilitiesBe aware of your responsibilities within the U.Va. community, especially the information in Responsible Computing: A Handbook for Students or Responsible Computing: A Handbook for Faculty and Staff. You may want to re-take the Responsible Computing Tutorial to ensure that you understand what is expected. |
||
|
Print This Page | Text-only Version Abuse of Information Technology
Maintained by: |