राइट द मीन ड्यूटीज एंड राइट्स ऑफ कंस्यूमर
Answers
Explanation:
1 right to safety 2 right to choose 3 right to be informed 4 right to be heard 5 consumer protection act
Answer:
Policy Statement:
Northwestern University Information Technology (NUIT) is the University organization that provides access to the network for Northwestern students, as well as for many Northwestern faculty and staff. The Northwestern computer network consists of a campus-wide backbone network, local area networks, and many shared computers as well as personal desktop computers. NUIT works to insure that network rights and responsibilities are not violated.
Background Issues:
Rights
Members of the Northwestern community can expect certain rights as they use the network and its services.
Intellectual Freedom: The University is a free and open forum for the expression of ideas, including viewpoints that are strange, unorthodox, or unpopular. The University network is the same. Network administrators place no official sanctions upon the expression of personal opinion on the network. However, such opinions may not be represented as the views of Northwestern University.
Safety from Threats: While unwanted or unsolicited contact cannot be controlled on the network, network users who receive threatening communications should bring them to the attention of University Police. Electronic threats are taken as seriously as voiced or written threats, consistent with University policy.
Privacy: Data files and messages traversing the University network are not private communications. The University reserves its right, as owner of the network and the computers in question, to examine, log, capture, archive, and otherwise preserve or inspect any messages transmitted over NUNet and any data files stored on University-owned computers. All members of the community must recognize that electronic communications are by no means secure, and that during the course of ordinary management of computing and networking services, network administrators may inadvertently view user files or messages. In addition, if a user is suspected of violations of the responsibilities as stated in this document, that user's privacy is superseded by the University's requirement to maintain the network's integrity, protect the rights of all network users, and promote respect for applicable laws and applicable license provisions. Should the security of a computer be threatened, user files and messages may be examined under the direction of the vice president & chief information officer, the associate vice president for cyber infrastructure, or a director of an IT division.