Mar 20, 2023  

Article II. Academic Integrity

Academic Integrity Policy

Link to Academic Integrity video

SECTION 2.00:  Expectations of the University

Fundamental to our mission, our core values, and our reputation, Doane University adheres to high academic standards. Students of Doane University are expected to conduct themselves in a manner reflecting personal and professional integrity. Disciplinary actions may be taken against students whose academic behavior is not congruent with the expectations of the University. Students are responsible for adhering to the standards detailed in this policy. Not being familiar with these standards does not mean that the students will not be accountable for adherence to them.

SECTION 2.01:  Scope, Limitations, and Applicability

This policy is for academic integrity violations occurring in or because of academic coursework and activities associated with taking and completing courses at Doane University. The Doane University Student Handbook discusses policies and processes for non-academic offenses.

SECTION 2.02:  Violations of Academic Integrity

In general, Doane University expects that a student will:

  • pursue their academic endeavors with honesty,
  • acknowledge and adhere to the expectations and guidelines in the syllabus,
  • follow instructions for assessments as specified by the faculty member, and
  • ask faculty for clarification if there are any questions.

An academic integrity violation includes, but is not limited to:

  1. Falsification or Fabrication: Making any oral or written statement, which the individual knows, or should have known, to be untrue. Falsification is the alteration of information, while fabrication is the invention or counterfeiting of information. Examples include, but are not limited to:
  • making a false statement to faculty, University employees, or fellow students;
  • submitting contrived or altered information in any academic exercise. Examples: making up data for an experiment, citing nonexistent articles, contriving reference sources;
  • giving a false excuse for missing an examination, quiz, or assignment deadline; and
  • falsely claiming to have submitted a paper or assignment.
  1. Cheating: Using or attempting to use unauthorized assistance, material, device, or a study aid in an examination or other academic work, or preventing, or attempting to prevent, another from using authorized assistance, material, or study aids. Examples include, but are not limited to:
  • using an unauthorized aid, material, electronic resource (e.g., website), or electronic device (e.g., cell phone or tablet) for an examination, quiz, or assignment;
  • copying from another student’s work;
  • copying another student’s answers during individual quizzes or examinations;
  • altering a graded exam and resubmitting it for a better grade without instructor authorization;
  • buying, selling, possessing, soliciting, transmitting, or using material purported to be the unreleased content of any assignment, including examinations and quizzes;
  • bribing or soliciting any person to obtain or to provide any information relating to examinations, quizzes, or other assignments outside of the bounds of the instructions for the assessment; and
  • acting as a substitute for another person during an examination or other assessment.
  1. Collusion and/or Complicity: Collaborating with one or more individuals without instructor approval, on any examination, quiz, computer or laboratory work, or any other assignment or assessment. Collusion includes exchanging or facilitating the exchange of materials or ideas verbally or non-verbally. Complicity includes helping or attempting to help another student to commit an act of academic dishonesty.
  1. Plagiarism: Using the ideas, data, presentation, or language of another without specific or proper acknowledgment in academic work. Examples include, but are not limited to:
  • quoting word-for-word from a source without using quotation marks and appropriate citation;
  • summarizing and paraphrasing ideas without acknowledging the source;
  • submitting a paper that was not authored by the student taking the course (e.g., written by another person, paper obtained from a commercial source); and
  • failing to verbally acknowledge one or more sources during an oral presentation.
  1. Multiple Submissions:  Submitting, without prior permission, academic work that has been previously submitted in identical or similar form to fulfill another academic requirement without instructor authorization. Examples include, but are not limited to, submitting the same paper for credit in two different courses.

SECTION 2.03:  Reporting of Violations

Faculty are expected to follow the process for reporting academic integrity violations in order to maintain the expectations of the University. The philosophy for faculty to report all violations allows the University to maintain a record and documentation of all incidents in a student’s file. A faculty member may be unaware that a student has had a prior violation and that a new violation would require additional reviews and/or consequences. Students and faculty are prohibited from proposing and/or entering into an arrangement with an instructor to receive a grade of “F” or any other reduction in grade in a course or on an academic exercise in lieu of being charged with a violation of the academic integrity policy. Additionally, a student is not permitted to drop the course as a means to avoid being charged with a violation. Students are encouraged to report suspected or known violations of academic integrity to appropriate faculty, staff, or administrators.

SECTION 2.04:  Consequences for an Academic Integrity Violation

Possible consequences for an academic integrity violation include, but are not limited to

Course-Level Consequences (one or more to be specified by the faculty member of the course):

  • warning on academic integrity and what constitutes a violation
  • requiring the student to redo the assignment or examination
  • lowering the student’s grade for the assignment or examination
  • assigning a zero or failing grade for the assignment or examination
  • lowering the student’s grade for the course
  • assigning the student a failing grade for the course
  • referral to academic support office for assistance with academic needs
  • referral to Academic Integrity Subcommittee for additional review

University-Level Consequences (to be specified by the Academic Integrity Committee or the Appeal Committee):

  • suspension from a program or the University
  • dismissal from a program or the University

SECTION 2.05:  Academic Integrity Process

NOTE: The specified timeline for actions and decisions can potentially be lengthened due to circumstances (e.g. school breaks, unavailability of individuals), though those involved should seek to resolve the issue in a timely manner, and communicate and agree upon any changes to the timeline as soon as possible.

STEP 1: Identification of Violation.

The faculty member identifies an alleged academic integrity violation.

STEP 2:  Reporting a Violation.

  1. The faculty member contacts the student in a timely manner regarding the alleged violation to request a discussion with the student (in person or via technology). For purposes of this process, the day when the faculty member contacts the student is considered Day One. The discussion between the student and faculty should take place within five (5) business days of the faculty member identifying an alleged violation.
  2. The student has two (2) business days to provide the faculty member with his or her own written summary detailing the incident, to provide any relevant documentation or evidence, and to describe any related circumstances. The student can submit this material using the following online form: If the student chooses to not have a discussion with the faculty member and/or does not provide a written explanation, the faculty member should move forward with the process and note that the student did not participate.
  3. The faculty member has up to three (3) business days to render a decision:
  • A violation did not occur.  The process ends and no details are recorded or submitted.
  • A violation did occur.  The faculty member is encouraged to consult with his or her supervisor for the course (e.g., Department Chair, Division Chair, Program Director, or Dean) to discuss the violation and proposed Course Level consequence(s). The faculty member must specify a consequence(s) and submit all relevant documentation and actions to the Registrar’s Office using an online form:  As part of the submission form, a faculty member can indicate if the issue is egregious and should be forwarded to the Academic Integrity Subcommittee for additional review. The Registrar’s office will forward a copy of the completed Academic Integrity submission to the respective Dean of the course. 
  1. The faculty member has one (1) business day to notify the student of his or her decision and the Course Level consequence(s), if applicable.

STEP 3: Documentation

  1. If the student disagrees with the faculty member’s decision, within two (2) business days of being notified by the faculty member, the student must submit a disagreement letter to the Academic Integrity Subcommittee outlining his or her disagreement with the alleged violation and/or disagreement with the consequence(s). The student must provide the letter to the Registrar’s office and address it to the Academic Integrity Subcommittee. The disagreement letter must include discussion of any evidence or additional circumstances.
  2. The Registrar’s Office will review the Academic Integrity Violation submission. If it is the first violation for a student and the faculty member did not recommend that it be forwarded to the Academic Integrity Subcommittee, the Registrar’s Office will record the incident in the student’s file.
  3. The Registrar will forward the incident to the faculty Academic Integrity Subcommittee if any of the following exists:
  • The student has a prior academic integrity violation.
  • The student submits a disagreement letter as to whether a violation occurred and/or disagrees with the consequence(s).
  • The faculty member recommends that the violation be forwarded to the Academic Integrity subcommittee.
  1. The Registrar’s Office will notify the student either that the violation has been recorded in his or her academic file or that it will be reviewed by the Academic Integrity Subcommittee.

STEP 4: Academic Integrity Subcommittee Deliberation

  1. The Academic Integrity Subcommittee will deliberate regarding academic integrity violation cases that have been submitted to the committee for a decision. The subcommittee should contain at least one faculty member from the College in which the course was taught. The Academic Integrity Subcommittee will perform due diligence in reviewing a violation. As part of the review, the committee will review all relevant documentation and may consult with relevant involved parties such as students, faculty, staff, or administrators for information, guidance, and/or clarification. The committee will determine:
  • whether an academic integrity violation occurred and/or
  • what type of academic integrity violation occurred.
  1. After determination of a violation, the Academic Integrity Subcommittee will make a determination to support the proposed Course Level consequence(s) or determine different Course Level consequence(s) to ensure consistency across the University and/or impose a University Level consequence(s) for the violation, taking into consideration the decision of the faculty member and the prior history of the student.
  2. The majority decision of the Academic Integrity Subcommittee will be shared with the Registrar’s Office. Within two (2) business days, the Registrar’s Office will communicate the decision to the student, the faculty member, and the respective Dean of the course.

STEP 5: Appeal Process

  1. A student has the right to appeal the Academic Integrity Subcommittee decision. Within five (5) business days of being notified by the Registrar’s Office of the Academic Integrity Subcommittee decision, a student can submit a written appeal to the respective Dean of the course that must address one or both of the following issues for appeal:
  • new evidence that was not reviewed by the Academic Integrity Subcommittee and/or
  • any evidence that the review process was improper or unfair.
  1. An appeal letter that does not clearly identify one or both of the issues listed above shall be dismissed without further consideration. The respective Dean of the course will make an initial assessment of a valid appeal after reviewing the incident file provided by the Registrar’s Office and, if necessary, by communicating with relevant parties such as staff or administrators.
  • For a valid appeal request, within ten (10) days the respective Dean of the course will schedule a meeting of an Appeal Committee consisting of:
    • Provost (or designee), who will serve as chair;
    • Associate Vice President of Academic Affairs-Online Operations (only if the course is an online course);
    • Dean (or administrative designee) of each of the colleges;
    • Two full-time faculty members appointed by the Faculty Council who teach outside of the department of the student, have had minimal academic interaction with the student, and who have been at the Doane University at least one year; and
    • Registrar (or designee).

The Registrar and respective Dean of the course can be participants in the discussions but will be non-voting members in determining a course of action. All members or their designees must participate for deliberation and decision.

  1. The Appeal Committee will perform due diligence in reviewing an incident. As part of the due diligence, the Committee will review all relevant documentation and may consult with relevant involved parties such as students, faculty, Academic Integrity Subcommittee, staff, or administrators for information, guidance, and/or clarification. The Committee will review the prior decisions for consequence(s) by the faculty member and by the Academic Integrity Subcommittee, as well as review the history in the student’s file.
  2. The Appeal Committee will make a determination to support the consequence(s) or determine different Course Level consequence(s) to ensure consistency across the University or impose a University Level consequence(s) for the violation.
  3. A majority decision by the Appeal Committee is final and ends the appeal process for an academic integrity violation.
  4. Within two (2) business days, the Registrar’s office will communicate the majority decision of the Appeal Committee to the student, the faculty member, and the Academic Integrity Subcommittee.

The policy is based off of similar academic integrity policies developed by Nebraska Methodist College and University of Nebraska-Lincoln.


Section 2.06 Computer Use Policy and Procedures

Information technology and resources include, but are not limited to: computers, software, databases, files, computer accounts, networks, Internet access, and electronic communication. The following are guidelines for acceptable use of information technology at Doane University.

The use of information technology and resources is a privilege extended to Doane University students, faculty, and staff. That use is restricted to academic, educational, research, and/or administrative purposes. These resources may not be used for commercial or business income purposes unless specific, written authorization for such use is given by the University. Any reselling of Doane’s network services is prohibited.

All use of information technology and resources must comply with federal, state and local laws, licensing and purchasing agreements, and Doane policies. Users of third party electronics services such as libraries, Internet, or other electronic communication services must also comply with the acceptable practices and restrictions established by those entities.

Individuals may not use institutional resources without proper authorization from the assigned user of the resource. Individuals may not use another user’s computer account or user I.D. or change another user’s password.  Users are responsible for their use of computer hardware, software, accounts, user I.D.s and passwords. Users are responsible for all resources assigned to them even if another person uses them.

Users must not access, copy, view or change private files without authorization. They may not change, create, or delete public files or directories without proper authorization. Users do not have the right to create or receive unauthorized copies of software. Users must not attempt to modify software, data, or systems in an unauthorized manner.

Information technology and resources must not be used to make unauthorized access into other informational devices or resources.  Accessing restricted databases requires authorization.

Section 2.07 Abuse/Misuse of Resources

Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services, or equipment. This includes, but is not limited to:

  1. Threatening or harassing others. This includes electronically transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or Doane University regulations.
  2. Propagating viruses or worms.
  3. Posting or mailing of obscene materials.
  4. Displaying obscene, lewd, or sexually harassing images or text on a computer owned by Doane University or in a location that may be easily viewed by others.
  5. Distributing unsolicited advertising, initiating or propagating electronic chain letters, inappropriate mass mailing, including multiple mailings to newsgroups, mailing lists, or individuals, e.g. spamming” flooding,” or “bombing,” or random mailing of messages.
  6. Impersonating another user or entity while using Doane University technology resources or services in such a manner as to create the impression to the recipient that the information was originated from another source or individual.  All materials sent via the university network must be attributed to the individual, office or organization sending the material.
  7. Using the university network to gain unauthorized access to any computer systems (including other student-owned computers).
  8. Connecting unauthorized equipment to the University network (this includes personal hubs, switches, routers, wireless access points, servers, and any other devices that may have a negative effect on network performance or services).
  9. Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
  10. Associating an unapproved domain name with a Doane University-owned IP address or resource.
  11. Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks (this includes downloading excessive amounts or transferring excessive amounts across the network).
  12. Deliberately wasting/overloading computing resources, such as printing too many copies of a document or using excessive bandwidth on the network. Individuals who are misusing resources will be notified and given an opportunity to adjust their usage. If the individual does not voluntarily comply, access for that individual will be electronically restricted.
  13. Using Doane University resources for commercial activity such as creating products or services for sale.
  14. Forging or disguising the identity of a user or machine in an electronic communication.
  15. Attempting to monitor or tamper with other user’s electronic accounts; communications; or reading, copying, changing, or deleting another user’s files, profiles or software without the explicit agreement and knowledge of the owner.
  16. Violating copyright laws and their fair use provisions through inappropriate reproduction, downloading, and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc. Note: all Doane network users are expected to comply with the copyright laws of the United States, regardless of the location of the server from which they are downloading.
  17. Violations of the Doane University acceptable use policy are subject to action by the University. Violations will be referred to the Vice President for Information Technology, who will report issues and problems for review by the appropriate Administrator or the Vice President for Enrollment and Student Experience and the Vice President of Academic Affairs, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to dismissal, suspension, loss of network and computing privileges, and/or legally prosecuted.

Section 2.08 Copyright Infringement

The software used by the institution is protected under federal Copyright Law. All students, staff, and faculty must comply with these regulations. It is illegal to make personal copies of software unless specifically allowed by a license agreement. Questions regarding specific instances should be directed to a professional staff member of Information Technology Services.

Students found in possession of illegal copies of software (either copies they have made or acquired by other means, or copies of software designated for use in class sessions or through the library that have not been issued to a student) will be subject to disciplinary action.

Copyright Law and Fair Use

Students, Faculty and staff have an obligation to practice high copyright standards and comply with policies and laws.   

Digital Millennium Copyright Act

The Digital Millennium Copyright Act (DMCA) passed by Congress in 1998, makes it illegal to copy or share intellectual property–music, videos, games, software and other materials–without permissions.  Doane University adheres to the regulations and guidelines outline by the DMCA. 

Fair Use 

Fair Use comprises Section 107 of the Copyright Act and was set up in recognition that free exchange of information is beneficial. Four standards are applied: the purpose and character of the use; the nature of the copyrighted work; the amount and substantiality of the portion used; and the effect of the use on the publisher’s potential market.  

However, the vast majority of online music and video sharing is done in ways that do not constitute fair use. The good news is that there are legal sources.

Legal online sources for copyrighted materials  

There are many legal sources for copyrighted material such as music and movies; some are even free. Additional resources can be found on our website at

Information Privacy and Security

Doane University reserves the right to monitor electronic activity of users when there is activity that appears to be harmful to another user, to the campus system and/or network (programs being launched to attack the servers, users attempting to break into accounts, etc.), or when there is evidence of violations of the appropriate use policy.

When there is no evidence of an appropriate use violation or threat to the Doane University system or network, computer users have the right to expect that their materials remain private.  No person, regardless of status (i.e., including the system manager, faculty member or university administrator) may view, change or remove another user’s files without the user’s permission, whether the material exists on network media or on a user’s own media.  An exception exists for class accounts which are owned and managed by an instructor or system manager and which exists strictly for a class project and which excludes personal electronic mail.  In these cases, the administrator of the account is allowed complete access, but persons outside of the class are not.  Documents stored on public use computers (labs) have no expectation for privacy and documents may be deleted at any time.

Doane University will actively monitor electronic security measures; however, users should be aware that no information system is completely secure.  Persons both within and outside of the university may find ways to access files.  Therefore, the university does not guarantee user privacy.