We all have Acceptable Use Policies/Statements....
When you have found a student hacker on campus how did the AUS hold up?
How did your Senior Admin handle the situation?
We're still collecting data and taking into account the reality that
we'll go to an external consultant to keep the data 'clean and
unbias'...but I'm keen on idea/advice amongst you all - feel free to
email me off list.
Regards,
Don
[ For info on ISED-L see http://www.gds.org/ISED-L ]
Submissions to ISED-L are released under a Creative Commons license.