- Information Security Policy
- Personally Identifiable Information Policy
- Technology Acceptable Use Policy
- Mass Electronic Communications Policy
- Business Continuity Plan
- IT Project Management Methodology
Information technology and resources include, but are not limited to: computers, software, databases, files, computer accounts, networks, Internet access, and electronic communication. The following are guidelines for acceptable use of information technology at Doane University.
The use of information technology and resources is a privilege extended to Doane University students, faculty, and staff. That use is restricted to academic, educational, research, and/or administrative purposes. These resources may not be used for commercial or business income purposes unless specific, written authorization for such use is given by the college. Any reselling of Doane's network services is prohibited.
All use of information technology and resources must comply with federal, state, and local laws, licensing and purchasing agreements, and Doane policies. Users of outside facilities such as libraries, Internet, or other electronic communication facilities must also comply with the acceptable practices and restrictions established by those facilities.
Individuals may not use institutional resources without proper authorization from the assigned user of the resource. Individuals may not use another user's computer account or user I.D. or change another user's password without prior permission from the assigned user. Users are responsible for their use of computer hardware, software, accounts, user I.D.s and passwords. Users are responsible for all resources assigned to them even if another person uses them.
Users must not access, copy, view, or change private files without authorization. They may not change, create, or delete public files or directories without proper authorization. Users do not have the right to create or receive unauthorized copies of software. Users must not attempt to modify software, data, or systems in an unauthorized manner.
Information technology and resources must not be used to make unauthorized entry into other communications, computational, or informational devices or resources. Accessing restricted databases requires authorization.
Abuse/Misuse of Resources
Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services, or equipment. This includes, but is not limited to:
- Threatening or harassing others. This includes electronically transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or Doane University regulations.
- Propagating viruses or worms.
- Posting or mailing obscene materials.
- Displaying obscene, lewd, or sexually harassing images or text on a computer owned by Doane University or in a location that may be easily viewed by others.
- Distributing unsolicited advertising, initiating or propagating electronic chain letters, inappropriate mass mailing, including multiple mailings to newsgroups, mailing lists, or individuals, e.g. "spamming, "flooding," or "bombing," or random mailing of messages.
- Originating e-mail in such a manner as to create the impression to the recipient that the mail was originated from another source or individual. All materials sent via the campus network must be attributed to the individual, office or organization sending the material.
- Using the campus network to gain unauthorized access to any computer systems (including other student-owned computers).
- Connecting unauthorized equipment to the campus network (this includes personal hubs, switches, routers, wireless access points, servers, and other devices that may have negative effect on network performance).
- Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
- Associating an unapproved domain name with a Doane University-owned IP address.
- Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks (this includes downloading excessive amounts or transferring excessive amounts across the network).
- Deliberately wasting/overloading computing resources, such as printing too many copies of a document or using excessive bandwidth on the network. Individuals who use excessive amounts of bandwidth will be notified and given an opportunity to adjust their usage. If the individual does not voluntarily comply, access for that individual will be electronically restricted.
- Using Doane University resources for commercial activity such as creating products or services for sale.
- Forging or disguising the identity of a user or machine in an electronic communication.
- Attempting to monitor or tamper with other user's electronic accounts; communications; or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner.
- Violating copyright laws and their fair use provisions through inappropriate reproduction, downloading, and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc. Note: all Doane network users are expected to comply with the copyright laws of the United States, regardless of the location of the server from which they are downloading.
Violations of the Doane University acceptable use policy are subject to action by the college. Violations will be referred to the Vice President for Information Technology Services, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to loss of network and computing privileges, dismissal, suspension, and/or legally prosecuted.
The software used by the institution is protected under federal Copyright Law (Digital Millennium Copyright Act). All students, staff, and faculty must comply with these regulations. It is illegal to make personal copies of software unless specifically allowed by a license agreement. Questions regarding specific instances should be directed to a professional staff member of the Office of Technology.
Software and Hardware Maintenance
All users must share the responsibility for keeping software and equipment in good repair. If a user encounters a problem with a piece of software or equipment, he or she should report this to a computer lab aide, a professional staff member of the Office of Technology, or a member of the library staff.
Computer Lab Policies
Users should not save their documents to the hard drives on the lab computers; network file space is made available to all students, faculty, and staff for this purpose. Documents and miscellaneous files are periodically removed from the computer lab hard drives and the user could lose his or her data. Users of the computer labs are expected to pick up any extraneous paper waste that result from their printing and place any computer paper in the receptacles provided for recycling. Excessive printing in the labs is not allowed. If you mistakenly submit a print job that is extremely large, you should notify the network administrator or lab aid on duty to cancel the print job as soon as possible. No equipment supplies, software, or manuals may be removed from computing sites without proper authorization.
All food, drink, and tobacco products are strictly prohibited from entering the computer labs.
Laptop computers are available in the library. From the time the laptop is checked out to the time it is returned, the person who has checked out the laptop assumes full responsibility for the care of the equipment and will return it in full working order or be charged for necessary repairs due to damages incurred. While checking out a laptop, the user assumes full responsibility even if someone else is using it. If a user fails to return a laptop, the user will be charged replacement cost and processing fees for the hardware and software.
Privacy Expectations and Exceptions
Doane University reserves the right to monitor electronic activity of users when there is activity that appears to be harmful to another user, to the campus system and/or network (programs being launched to attack the servers, users attempting to break into accounts, etc.), or when there is evidence of violations of the appropriate use policy.
When there is no evidence of an appropriate use violation or threat to the Doane University system or network, computer users have the right to expect that their materials remain private. No person, regardless of status (i.e., including the system manager, faculty member or college administrator) may view, change or remove another user's files without the user's permission, whether the material exists on network media or on a user's own media. An exception exists for class accounts which are owned and managed by an instructor or system manager and which exists strictly for a class project and which excludes personal electronic mail. In these cases, the administrator of the account is allowed complete access, but persons outside of the class are not. Documents stored on public use computers (labs) have no expectation for privacy and documents may be deleted at any time.
Doane University will actively monitor electronic security measures; however, users should be aware that no information system is completely secure. Persons both within and outside of the college may find ways to access files. Therefore, the college does not guarantee user privacy.