![]() ![]() It will also be used to report and automatically address security issues on the machine such as the presence of viruses or malware.Īny IT administrators with access to the endpoint security tools, including the IT Security Office, are required to adhere to the Duke Acceptable Use Policy, particularly those statements regarding the expectation of privacy for the Duke community:ĭuke cherishes freedom of expression, the diversity of values and perspectives inherent in an academic institution, the right to acknowledgment, and the value of privacy for all members of the Duke community. The applications used to support this efforts may only be used to: (a) report on missing software updates or (b) apply missing software updates if the machine is fully managed by departmental or central IT staff. The purpose of Duke’s endpoint security program is to secure laptops and desktops purchased by Duke and used by faculty and staff. Endpoint Management Operational and Privacy Protocols
0 Comments
Leave a Reply. |