Apr 25, 2024  
ARCHIVED 2015-16 SA&S Crete Campus Catalog 
    
ARCHIVED 2015-16 SA&S Crete Campus Catalog [ARCHIVED CATALOG]

Article II. Academic Integrity



Academic Integrity Policy

In order for Doane College to provide, clarify, and preserve an atmosphere in which individuals can strive for academic excellence, the following policy is stated to deter acts of academic dishonesty. Academic dishonesty, the act of knowingly and willingly attempting or assisting others to gain academic success by dishonest means, is manifested in various measures. Gehring, et al, (1986) suggests that four categories of academic dishonesty exist1:

  1. Cheating
  2. Fabrication
  3. Facilitating academic dishonesty
  4. Plagiarism

The college has chosen to identify those same categories and to apply them in a manner that is appropriate for the Doane setting. Provided with each category is the respective gathering definition and list of isolated, but not inclusive, examples of infractions. It must be noted that the essential, qualifying characteristic that must be implied with each is that the instructor must consider the alleged offense to be dishonest.

1 Gehring, D, Nuss, E. M., & Pavela, G. (1986). Issues and perspectives on academic integrity. Columbus, OH: National Association of Student Personnel Administrators (NASPA).

Section 2.01 Academic Dishonesty

  1. Cheating - “Intentionally using or attempting to use unauthorized information or study aids in an academic exercise” (Gehring, et al p.6). Examples are (list is not all-inclusive):
    1. Intentionally using an unauthorized source to complete an objective. This may include such infractions as looking at another’s paper during an exam and/or using unauthorized, pre-written responses or electronically stored information such as “crib notes” and computer disks.
    2. Submitting someone else’s work as one’s own research or data.
    3. Allowing another to complete an exam in one’s stead.
    4. Submitting a project that has been or is currently being used to satisfy requirements for another course without the explicit permission of both instructors.
    5. Improper collaboration on projects beyond that permitted by the instructor.
  2. Sharing information between exams in multiple sections of a course.
  3. Fabrication - “Intentional and unauthorized falsification of invention or any information or citation in an academic exercise” (Gehring, et al, p. 6). Examples (list is not all-inclusive):
    1. Supplying fabricated “dry lab” data for an experiment or laboratory project.
    2. Fabricating all or a portion of a bibliographic entry for a document or project.
  4. Facilitating Academic Dishonesty - “Intentionally or knowingly helping or attempting to help another to commit an act of dishonesty (Gehring, et al, p. 6) and/or coercing others to do the same. Examples (list is not all-inclusive):
    1. Allowing one’s own work to be submitted as another’s work for a course project.
    2. Providing or offering unauthorized aid to another for a course objective. This would include allowing another to observe one’s answers on an exam.
    3. Making threats or offers of compensation to others in order that those threatened or coerced will provide unauthorized aid for course projects.
    4. Unauthorized acquisition or subsequent use or possession of stolen materials. This would include the distribution of said materials to others and also constitutes the additional infraction of cheating for all those who acquired, distributed, used or passed the stolen materials.
  5. Plagiarism - “Intentionally or knowingly representing the words or ideas of another as one’s own in any academic exercise,” (Gehring, et al, p. 6) in both oral and written projects. Examples:
    1. Purchasing a paper from a commercial or private source, using a paper from an organization’s files, copying sections or chapters from reference works or borrowing or stealing another’s paper and submitting it as one’s own work.
    2. Failing to indicate a direct quote from a reference source by using quotation marks and proper citation of the source.
    3. Attempting to represent the work, words, and ideas of another (paraphrasing) as one’s own without proper citation or documentation.
    4. Failing to acknowledge information obtained in one’s reading or research that is not common knowledge.

Section 2.02 Sanctions for Academic Integrity

The process is initiated when a faculty member files a complaint for alleged act(s) of academic dishonesty or misconduct. The faculty member will write up the incident and file a copy of the formal complaint with the Chair of the Academic Integrity Committee, who will forward the complaint to the Academic Affairs Office. Copies of any documents of evidence must be provided to the Academic Affairs Office. Before the Charge of Academic Integrity Violation complaint form is filed, the student must sign the form to show that he/she has been info med of the charges. Only the Chair of the Academic Affairs Integrity Committee will check to see if this is a first or subsequent charge(s) for the student.

The faculty member will retain discretion with regard to the sanctions for the offense in the case of a first offense. However, sanctions will not be imposed until the faculty member receives written notification from the Academic Integrity Committee concerning the outcome of the meeting between the committee and the student. If a student is charged and found guilty of a subsequent offense, the faculty member may impose sanctions for the course; however, the committee may impose additional sanctions. In cases where the faculty member is a parent or close relative of the student involved, the faculty member is required to submit documents related to suspected academic dishonesty to the Department Chair or Vice President for Academic Affairs for evaluation and processing pursuant to the steps below.

Section 2.03 First Offense

  1. Once the charge has been filed, the student will be notified of when to appear before the Academic Integrity Committee. At this time, students will be notified that they may have an advocate appear before the committee with them. If the student fails to appear at the set time without an excuse acceptable to the Committee, the charges will be automatically confirmed.
  2. If the student admits to the charge, he/she will appear before the committee to discuss academic integrity. The complaint and accompanying documentation will be filed with the Academic Affairs Office. The faculty member will be informed concerning the outcomes of the meeting and will impose sanctions for the course. If the student decides to appeal the charges, he/she is required to notify the chair of the Academic Integrity Committee in writing within 72 hours after receiving the initial notice. Committee members will hear testimony from the student and faculty member who has been asked to be available at the time of the meeting) and will have the opportunity to ask the student questions as well as inform the student on issues related to academic integrity. Students may provide evidence on their behalf.
  3. Based on the testimony, the Committee will either confirm or rescind the charges. [NOTE: If the charges are rescinded, the student is exonerated and all documentation sent to the Academic Affairs Office and the Chair of the Committee will be destroyed immediately. If the charges are confirmed, the complaint and accompanying documentation will be kept only in the Academic Affairs Office for a period of seven years for record-keeping purposes (i.e. to establish whether or not a student has a prior complaint). At the end of the seven-year period, all documents concerning this charge are destroyed.]
  4. If appealing or denying the charges, the student will be informed at the end of the meeting when the written decision of the Committee will be sent to the student through campus mail and that the student will need to sign for the letter during the next two weeks. The student has the right to appeal the Committee’s decision to the Vice President for Academic Affairs within 72 hours after receiving the Committee’s written decision. If the student has not signed for the written decision in the two weeks after the date of the letter, it will be assumed that the student does not wish to appeal. The faculty member will be informed of the Committee’s decision and will impose sanctions for the course.
  5. If the charges are confirmed, the student’s adviser will also be informed of the charges and the sanction(s) in writing.

Section 2.04 Subsequent Offense(s):

If a complaint is filed by a faculty member and it is determined that this is a subsequent offense for the student, the following procedures will take effect:

  1. If the Committee confirms the charges, the Committee has the right to impose additional sanctions for the second offense, including possible suspension or expulsion from the College.
  2. The student has the right to appeal the Committee’s decision to the Vice President for Academic Affairs within 72 hours after receiving the Committee’s written decision.

Section 2.05 Computer Use Policy and Procedures

Information technology and resources include, but are not limited to: computers, software, databases, files, computer accounts, networks, Internet access, and electronic communication. The following are guidelines for acceptable use of information technology at Doane College.

The use of information technology and resources is a privilege extended to Doane College students, faculty, and staff. That use is restricted to academic, educational, research, and/or administrative purposes. These resources may not be used for commercial or business income purposes unless specific, written authorization for such use is given by the College. Any reselling of Doane’s network services is prohibited.

All use of information technology and resources must comply with federal, state and local laws, licensing and purchasing agreements, and Doane policies. Users of third party electronics services such as libraries, Internet, or other electronic communication services must also comply with the acceptable practices and restrictions established by those entities.

Individuals may not use institutional resources without proper authorization from the assigned user of the resource. Individuals may not use another user’s computer account or user I.D. or change another user’s password.  Users are responsible for their use of computer hardware, software, accounts, user I.D.s and passwords. Users are responsible for all resources assigned to them even if another person uses them.

Users must not access, copy, view or change private files without authorization. They may not change, create, or delete public files or directories without proper authorization. Users do not have the right to create or receive unauthorized copies of software. Users must not attempt to modify software, data, or systems in an unauthorized manner.

Information technology and resources must not be used to make unauthorized access into other informational devices or resources.  Accessing restricted databases requires authorization.

Section 2.06 Abuse/Misuse of Resources

Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services, or equipment. This includes, but is not limited to:

  1. Threatening or harassing others. This includes electronically transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or Doane College regulations.
  2. Propagating viruses or worms.
  3. Posting or mailing of obscene materials.
  4. Displaying obscene, lewd, or sexually harassing images or text on a computer owned by Doane College or in a location that may be easily viewed by others.
  5. Distributing unsolicited advertising, initiating or propagating electronic chain letters, inappropriate mass mailing, including multiple mailings to newsgroups, mailing lists, or individuals, e.g. spamming” flooding,” or “bombing,” or random mailing of messages.
  6. Impersonating another user or entity while using Doane College technology resources or services in such a manner as to create the impression to the recipient that the information was originated from another source or individual.  All materials sent via the college network must be attributed to the individual, office or organization sending the material.
  7. Using the college network to gain unauthorized access to any computer systems (including other student-owned computers).
  8. Connecting unauthorized equipment to the college network (this includes personal hubs, switches, routers, wireless access points, servers, and any other devices that may have a negative effect on network performance or services).
  9. Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
  10. Associating an unapproved domain name with a Doane College-owned IP address or resource.
  11. Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks (this includes downloading excessive amounts or transferring excessive amounts across the network).
  12. Deliberately wasting/overloading computing resources, such as printing too many copies of a document or using excessive bandwidth on the network. Individuals who are misusing resources will be notified and given an opportunity to adjust their usage. If the individual does not voluntarily comply, access for that individual will be electronically restricted.
  13. Using Doane College resources for commercial activity such as creating products or services for sale.
  14. Forging or disguising the identity of a user or machine in an electronic communication.
  15. Attempting to monitor or tamper with other user’s electronic accounts; communications; or reading, copying, changing, or deleting another user’s files, profiles or software without the explicit agreement and knowledge of the owner.
  16. Violating copyright laws and their fair use provisions through inappropriate reproduction, downloading, and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc. Note: all Doane network users are expected to comply with the copyright laws of the United States, regardless of the location of the server from which they are downloading.
  17. Violations of the Doane College acceptable use policy are subject to action by the College. Violations will be referred to the Vice President for Information Technology, who will report issues and problems for review by the appropriate Administrator or the Vice President of Student Leadership and the Vice President of Academic Affairs, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to dismissal, suspension, loss of network and computing privileges, and/or legally prosecuted.

Section 2.07 Copyright Infringement

The software used by the institution n protected under federal Copyright Law. All students, staff, and faculty must comply with these regulations. It is illegal to make personal copies of software unless specifically allowed by a license agreement. Questions regarding specific instances should be directed to a professional staff member of Information Technology Services.

Students found in possession of illegal copies of software (either copies they have made or acquired by other means, or copies of software designated for use in class sessions or through the library that have not been issued to a student) will be subject to disciplinary action.

Copyright Law and Fair Use

Students, Faculty and staff have an obligation to practice high copyright standards and comply with policies and laws.   

Digital Millennium Copyright Act

The Digital Millennium Copyright Act (DMCA) passed by Congress in 1998, makes it illegal to copy or share intellectual property–music, videos, games, software and other materials–without permissions.  Doane College adheres to the regulations and guidelines outline by the DMCA. 

Fair Use 

Fair Use comprises Section 107 of the Copyright Act and was set up in recognition that free exchange of information is beneficial. Four standards are applied: the purpose and character of the use; the nature of the copyrighted work; the amount and substantiality of the portion used; and the effect of the use on the publisher’s potential market.  

However, the vast majority of online music and video sharing is done in ways that do not constitute fair use. The good news is that there are legal sources.

Legal online sources for copyrighted materials  

There are many legal sources for copyrighted material such as music and movies; some are even free. Additional resources can be found on our website at www.doane.edu/technology.

Information Privacy and Security

Doane College reserves the right to monitor electronic activity of users when there is activity that appears to be harmful to another user, to the campus system and/or network (programs being launched to attack the servers, users attempting to break into accounts, etc.), or when there is evidence of violations of the appropriate use policy.

When there is no evidence of an appropriate use violation or threat to the Doane College system or network, computer users have the right to expect that their materials remain private.  No person, regardless of status (i.e., including the system manager, faculty member or college administrator) may view, change or remove another user’s files without the user’s permission, whether the material exists on network media or on a user’s own media.  An exception exists for class accounts which are owned and managed by an instructor or system manager and which exists strictly for a class project and which excludes personal electronic mail.  In these cases, the administrator of the account is allowed complete access, but persons outside of the class are not.  Documents stored on public use computers (labs) have no expectation for privacy and documents may be deleted at any time.

Doane College will actively monitor electronic security measures; however, users should be aware that no information system is completely secure.  Persons both within and outside of the college may find ways to access files.  Therefore, the college does not guarantee user privacy.