Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Operational Security: Difference between revisions

From EVE University Wiki
No edit summary
Line 11: Line 11:
* Not discussing or even mentioning planned or ongoing fleet operations anywhere other than the relevant secure channels.
* Not discussing or even mentioning planned or ongoing fleet operations anywhere other than the relevant secure channels.
* Not publishing video recordings (live-streamed OR "FRAPSed") of fleet operations without consent. See [[Streaming_and_Video_Publishing|these rules]] for more detail.
* Not publishing video recordings (live-streamed OR "FRAPSed") of fleet operations without consent. See [[Streaming_and_Video_Publishing|these rules]] for more detail.
* Not asking for information on an active fleet - ILN leadership and Intel Officers may communicate directly with the fleet over voice comms.
* Not asking for information on an active fleet.
* Not entering a secure fleet channel (both voice comms and in-game) without explicit permission from the fleet commander.
* Not entering a secure fleet channel (both voice comms and in-game) without explicit permission from the fleet commander.
* Not starting a fleet without giving an indication as to how long the fleet will last, and not signing up for a fleet unless you can commit to at least 50% of the expected time out.
* Not starting a fleet without giving an indication as to how long the fleet will last, and not signing up for a fleet unless you can commit to at least 50% of the expected time out.
Line 19: Line 19:


== Security Assessments ==
== Security Assessments ==
The [[EVE University Management|CEO, Directors and ILN Leadership]] conduct constant security assessments using undisclosed procedures and take the relevant actions required. All members are asked to cooperate with requests for information made from them.
The [[EVE University Management|CEO and Directors]] conduct constant security assessments using undisclosed procedures and take the relevant actions required. All members are asked to cooperate with requests for information made from them.