UCL Computer Security Newsletter - August 2010
The purpose of this newsletter is to keep all security reps and other
interested parties informed about what is happening around UCL
regarding computer security. Further information from the Computer
Security Team is always available at http://www.ucl.ac.uk/isd/common/cst.
1. Lecture recording
JISC has published guidance examining the legal implications of recording lectures at UK HE and FE institutions, focusing mainly on the issues of copyright and consent. It includes a flow chart of the legal issues and model consent form for institutions to use. Available at: http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/Recording%20Lectures.pdf
Please ensure all machines are patched and up-to-date. Many machines probably lie around during the summer unused, but the combination of a raft of critical vulnerabilities in August and the end-of-life of Windows 2000 means that extra care needs to be taken to avoid unnecessary problems at the start of term. There are already some tools in the wild to exploit the latest vulnerabilities.
Please note all correspondence from the UCL Computer Security Team is digitally signed either with personal PGP keys or the CERT team key (public keys available fromhttp://www.ucl.ac.uk/isd/common/cst/contacts).
This newsletter and previous ones are available at http://www.ucl.ac.uk/isd/common/cst/cst-newsletters (except currently the March 2007 one as that had sensitive information in it).
We welcome feedback on the content and organisation of documents on our web page.