Still have questions?
...
What can WCTS see on my computer? I have privacy concerns.
WCTS cannot see specific content on your computer. SCCM and JAMF Pro are configured to only collect data pertaining to the hardware and software installed on your computer. For example, it will report that the computer is using an Intel processor, how much memory and storage capability it has, and that Microsoft Office 2010 version 10.2.3700 is installed. It will not capture any web sites you have visited nor will it be used to gather information on the specific files being stored. SCCM and JAMF Pro are intended to assist us in the support and security of computers by making sure that managed software is patched and up to date and to ensure that computers on campus are compliant with applicable laws (e.g. FERPA, HIPPA, etc.) that protect student and employee information.
WCTS takes your privacy very seriously and will use these tools in strict accordance with Whitman College’s Privacy Policy.
To read the full policy please visit Whitman College Privacy Policy
...
SCCM and JAMF Pro can report on what software is installed on computers. However, we will not be using this capability without your permission (or when state or federal law legally compels us to do so, as explained in Whitman’s Privacy Policy). [updated to accurately reflect internal policy] This information will be used in aggregate for licensing information and individually for identifying unpatched software in need of security updates.
...
The Whitman network is constantly being probed from outside for vulnerablilites, and it is important that all computers have security updates installed. Unpatched systems are a major cause of data breaches commonly reported in the news and are easily preventable. One of the primary uses of endpoint management tools is to ensure security updates are applied to Whitman-owned computers in a timely fashion. Such security updates include not only operating system updates from Microsoft and Apple, but also security updates to common software such as Java and Adobe. (See the list of specific software updated by WCTS above.)
I understand these tool can copy data to and from my computer, edit or delete my documents, record video, audio, or monitor usage or me. Is this accurate?
To a degree. These tools by themselves do not have built-in features to accomplish these tasks. It is possible that through the use of these tools a different piece of software could be installed that has these capabilities, however this would require explicit intent to do so. All actions or scripts performed on a computer are logged, including account used to access these tools.
Are there things I can do on my computer to add additional protections or notifications?
Yes. WCTS would be happy to work with you if you are interested in discussing additional layers of encryption or ways to enhance notification for changes happening on your computer.
Last Updated: November 915, 2017