Individual accounts are given to all authorized Georgia Tech users. These accounts identify users by a username or screen name. The accounts are used in conjunction with a password to authenticate users to various Georgia Tech services.
Authorized Georgia Tech Officials
Georgia Tech officials in management positions who are authorized by the Institute to make decisions regarding IT issues such as monitoring users and initiating an incident investigation that may involve Institute employees.
Bulk Email (spam)
Bulk email involves the sending of identical or nearly identical messages to numerous recipients.
Computer and network devices that are provided to users for the conduct of Institute Business. This can include computers, laptops, desktops, network access, smart phones, PDA’s, printers, USB devices, and other machines purchased by the Institute.
Data Stewards are ultimately responsible for access to the data they manage. For example, the Registrar is responsible for approving access to student data.
Stands for Denial of Service. This is a type of computer attack in which a computer system is made inaccessible to its intended user. Typically, a DOS attack involves one user and/or one computer. DDOS stands for Distributed Denial of Service. This is a DOS attack from many computers against one or a few computers.
An employee is any individual who works for Georgia Tech.
Electronics communication services at Georgia Tech include, but are not limited to:
- Telephone services
- Network services
- Instant Messaging and other “chat” programs
Information Technology Resources
Information Technology resources at Georgia Tech include, but are not limited to:
- Network services
- Lab computers
- Servers containing Georgia Tech data
- Application services (e.g. web, email, and database access)
- Computers, including laptops/desktops owned by Georgia Tech
Intellectual Property, or IP, are the legal rights over creations of mind, both artistic and commercial. Under IP law, owners are granted rights over intangible assets such as ideas, discoveries, inventions, etc. More information on IP protection at Georgia Tech may be found at: www.osp.gatech.edu/policies/intellectual.shtml.
The practice of covertly recording what keys are struck on a computer keyboard to ascertain information such as usernames and passwords.
Network Packet Capture
The act of capturing data packets crossing the network. This is often done with tools called network sniffers that record the data on a network, and store it for analysis.
An event that occurs due to a malicious act or intent to do harm to a computer system or network.
As defined by the Data Access Policy, sensitive data is information that is considered private and should be guarded from disclosure; disclosure of the information may contribute to financial fraud or violate state and/or federal law.
Students are individuals enrolled in classes at Georgia Tech.