Information technology and resources include, but are not limited to: computers, software, databases, files, computer accounts, networks, Internet access, and electronic communication. The following are guidelines for acceptable use of information technology at Doane University.
The use of information technology and resources is a privilege extended to Doane University students, faculty, and staff. That use is restricted to academic, educational, research, and/or administrative purposes. These resources may not be used for commercial or business income purposes unless specific, written authorization for such use is given by the college. Any reselling of Doane’s network services is prohibited.
All use of information technology and resources must comply with federal, state and local laws, licensing and purchasing agreements, and Doane policies. Users of outside facilities such as libraries, Internet, or other electronic communication facilities must also comply with the acceptable practices and restrictions established by those facilities.
Individuals may not use institutional resources without proper authorization from the assigned user of the resource. Individuals may not use another user’s computer account or user I.D. or change another user’s password. Users are responsible for their use of computer hardware, software, accounts, user I.D.s and passwords. Users are responsible for all resources assigned to them even if another person uses them.
Users must not access, copy, view or change private files without authorization. They may not change, create, or delete public files or directories without proper authorization. Users do not have the right to create or receive unauthorized copies of software. Users must not attempt to modify software, data, or systems in an unauthorized manner.
Information technology and resources must not be used to make unauthorized entry into other communications, computational, or informational devices or resources. Accessing restricted databases requires authorization.
ABUSE/MISUSE OF RESOURCES
Violations of the Doane University acceptable use policy are subject to action by the college. Violations will be referred to the Vice President for Information Technology, who will report issues and problems for review by the appropriate Administrator or the Dean of Student Leadership and the Academic Dean, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to dismissal, suspension, loss of network and computing privileges, and/or legally prosecuted.
Students found in possession of illegal copies of software (either copies they have made or acquired by other means, or copies of software designated for use in class sessions or through the library that have not been issued to a student) will be subject to disciplinary action.
SOFTWARE AND HARDWARE MAINTENANCE
All users are expected to abide by the end user licensing agreements for all other software that is either purchased through the Doane University Bookstore or installed on Doane University computers.
COMPUTER LAB POLICIES
All food, drink, and tobacco products are strictly prohibited from entering the computer labs. Students who do not comply with this regulation run the risk of exclusion from the labs for the remainder of the semester in which the violation occurred.
CONNECTING A COMPUTER TO THE NETWORK
Computers acting as servers or running server services are not allowed except where approved by the Office of Technology.
PRIVACY EXPECTATIONS AND EXCEPTIONS
When there is no evidence of an appropriate use violation or threat to the Doane University system or network, computer users have the right to expect that their materials remain private. No person, regardless of status (i.e., including the system manager, faculty member or college administrator) may view, change or remove another user’s files without the user’s permission, whether the material exists on network media or on a user’s own media. An exception exists for class accounts which are owned and managed by an instructor or system manager and which exist strictly for a class project and which exclude personal electronic mail. In these cases, the administrator of the account is allowed complete access, but persons outside of the class are not. Documents stored on public use computers (labs) have no expectation for privacy and documents may be deleted at any time.
Files which reside in a user’s account on a network drive or on a user’s personal computer are to be considered private except where a runaway program that could be either accidental or an intentional hack, or a virus is in the process of causing damage or is inhibiting the work of others. In this case, it may be necessary for a system manager to inspect the file that is suspected of causing the problem.