Academic Integrity Policy
Link to Academic Integrity video
Fundamental to our mission, our core values, and our reputation, Doane University adheres to high academic standards. Students of Doane University are expected to conduct themselves in a manner reflecting personal and professional integrity. Disciplinary actions may be taken against students whose academic behavior is not congruent with the expectations of the University. Students are responsible for adhering to the standards detailed in this policy. Not being familiar with these standards does not mean that the students will not be accountable for adherence to them.
This policy is for academic integrity violations occurring in or because of academic coursework and activities associated with taking and completing courses at Doane University. The Doane University Student Handbook discusses policies and processes for non-academic offenses.
In general, Doane University expects that a student will:
- pursue their academic endeavors with honesty;
- acknowledge and adhere to the expectations and guidelines in the syllabus;
- follow instructions for assessments as specified by the faculty member; and
- ask faculty for clarification if there are any questions.
An academic integrity violation includes, but is not limited to:
- Falsification or Fabrication: Making any oral or written statement, which the individual knows, or should have known, to be untrue. Falsification is the alteration of information, while fabrication is the invention or counterfeiting of information. Examples include, but are not limited to:
- making a false statement to faculty, University employees, or fellow students;
- submitting contrived or altered information in any academic exercise. Examples: making up data for an experiment, citing nonexistent articles, contriving reference sources;
- giving a false excuse for missing an examination, quiz, or assignment deadline; and
- falsely claiming to have submitted a paper or assignment.
- Cheating: Using or attempting to use unauthorized assistance, materials, devices, or a study aid in an examination or other academic work, or preventing, or attempting to prevent, another from using authorized assistance, materials, or study aids. Examples include, but are not limited to:
- using an unauthorized aid, material, electronic resource (e.g., website), or electronic device (e.g., cell phone or tablet) for an examination, quiz, or assignment;
- copying from another student’s work;
- copying another student’s answers during individual quizzes or examinations;
- altering a graded exam and resubmitting it for a better grade without instructor authorization;
- buying, selling, possessing, soliciting, transmitting, or using material purported to be the unreleased content of any assignment, including examinations and quizzes;
- bribing or soliciting any person to obtain or to provide any information relating to examinations, quizzes, or other assignments outside of the bounds of the instructions for the assessment; and
- acting as a substitute for another person during an examination or other assessment.
- Collusion and/or Complicity: Collaborating with one or more individuals without instructor approval, on any examination, quiz, computer or laboratory work, or any other assignment or assessment. Collusion includes exchanging or facilitating the exchange of materials or ideas verbally or nonverbally. Complicity includes helping or attempting to help another student to commit an act of academic dishonesty.
- Plagiarism: Using the ideas, data, presentation, or language of another without specific or proper acknowledgment in academic work. Examples include but are not limited to:
- quoting word-for-word from a source without using quotation marks and appropriate citation;
- summarizing and paraphrasing ideas without acknowledging the source;
- submitting a paper that was not authored by the student taking the course (e.g., written by another person, paper obtained from a commercial source); and
- failing to verbally acknowledge one or more sources during an oral presentation.
- Multiple Submissions: Submitting, without prior permission, academic work that has been previously submitted in identical or similar form to fulfill another academic requirement without instructor authorization. Examples include, but are not limited to, submitting the same paper for credit in two different courses.
Faculty are expected to follow the process for reporting academic integrity violations in order to maintain the expectations of the University. The philosophy for faculty to report all violations allows the University to maintain a record and documentation of all incidents in a student’s file. A faculty member may be unaware that a student has had a prior violation and that a new violation would require additional reviews and/or consequences. Students and faculty are prohibited from proposing and/or entering into an arrangement with an instructor to receive a grade of “F” or any other reduction in grade in a course or on an academic exercise in lieu of being charged with a violation of the academic integrity policy. Additionally, a student is not permitted to drop the course as a means to avoid being charged with a violation. Students are encouraged to report suspected or known violations of academic integrity to appropriate faculty, staff, or administrators.
Possible consequences for an academic integrity violation include, but are not limited to:
Course-Level Consequences (one or more to be specified by the faculty member of the course):
- warning on academic integrity and what constitutes a violation;
- requiring the student to redo the assignment or examination;
- lowering the student’s grade for the assignment or examination;
- assigning a zero or failing grade for the assignment or examination;
- lowering the student’s grade for the course;
- assigning the student a failing grade for the course;
- referral to the Academic Support Office for assistance with academic needs; or
- referral to the Academic Integrity Subcommittee for additional review.
University-Level Consequences (to be specified by the Academic Integrity Committee or the Appeal Committee):
- suspension from a program or the University
- dismissal from a program or the University
NOTE: The specified timeline for actions and decisions can potentially be lengthened due to circumstances (e.g. school breaks, unavailability of individuals), though those involved should seek to resolve the issue in a timely manner and communicate and agree upon any changes to the timeline as soon as possible.
STEP 1: Identification of Violation
The faculty member identifies an alleged academic integrity violation.
STEP 2: Reporting a Violation
- The faculty member contacts the student in a timely manner regarding the alleged violation to request a discussion with the student (in person or via technology). For purposes of this process, the day when the faculty member contacts the student is considered Day One. The discussion between the student and faculty should take place within five (5) business days of the faculty member identifying an alleged violation.
- The student has two (2) business days to provide the faculty member with his or her own written summary detailing the incident, to provide any relevant documentation or evidence, and to describe any related circumstances. The student can submit this material using the following online form: http://bit.ly/DU-integrity-student. If the student chooses to not have a discussion with the faculty member and/or does not provide a written explanation, the faculty member should move forward with the process and note that the student did not participate.
- The faculty member has up to three (3) business days to render a decision:
- A violation did not occur. The process ends and no details are recorded or submitted.
- A violation did occur. The faculty member is encouraged to consult with his or her supervisor for the course (e.g., Department Chair, Division Chair, Program Director, or Dean) to discuss the violation and proposed Course Level consequence(s). The faculty member must specify a consequence(s) and submit all relevant documentation and actions to the Registrar’s Office using an online form: http://bit.ly/DU-integrity-student. As part of the submission form, a faculty member can indicate if the issue is egregious and should be forwarded to the Academic Integrity Subcommittee for additional review. The Registrar’s Office will forward a copy of the completed Academic Integrity submission to the respective Dean of the course.
- The faculty member has one (1) business day to notify the student of his or her decision and the Course Level consequence(s), if applicable.
STEP 3: Documentation
- If the student disagrees with the faculty member’s decision, within two (2) business days of being notified by the faculty member, the student must submit a disagreement letter to the Academic Integrity Subcommittee outlining his or her disagreement with the alleged violation and/or disagreement with the consequence(s). The student must provide the letter to the Registrar’s Office email@example.com and address it to the Academic Integrity Subcommittee. The disagreement letter must include discussion of any evidence or additional circumstances.
- The Registrar’s Office will review the Academic Integrity Violation submission. If it is the first violation for a student and the faculty member did not recommend that it be forwarded to the Academic Integrity Subcommittee, the Registrar’s Office will record the incident in the student’s file.
- The Registrar will forward the incident to the faculty Academic Integrity Subcommittee if any of the following exists:
- The student has a prior academic integrity violation.
- The student submits a disagreement letter as to whether a violation occurred and/or disagrees with the consequence(s).
- The faculty member recommends that the violation be forwarded to the Academic Integrity Subcommittee.
- The Registrar’s Office will notify the student whether the violation has been recorded in his or her academic file or whether it will be reviewed by the Academic Integrity Subcommittee.
STEP 4: Academic Integrity Subcommittee Deliberation
- The Academic Integrity Subcommittee will deliberate regarding academic integrity violation cases that have been submitted to the committee for a decision. The Subcommittee should contain at least one faculty member from the College in which the course was taught. The Academic Integrity Subcommittee will perform due diligence in reviewing the violation. As part of the review, the Committee will review all relevant documentation and may consult with involved parties such as students, faculty, staff, or administrators for information, guidance, and/or clarification. The committee will determine:
- whether an academic integrity violation occurred and/or
- what type of academic integrity violation occurred.
- After determination of a violation, the Academic Integrity Subcommittee will make a determination to support the proposed Course Level consequence(s) or determine different Course Level consequence(s) to ensure consistency across the University and/or impose a University Level consequence(s) for the violation, taking into consideration the decision of the faculty member and the prior history of the student.
- The majority decision of the Academic Integrity Subcommittee will be shared with the Registrar’s Office. Within two (2) business days, the Registrar’s Office will communicate the decision to the student, the faculty member, and the respective Dean of the course.
STEP 5: Appeal Process
- A student has the right to appeal the Academic Integrity Subcommittee decision. Within five (5) business days of being notified by the Registrar’s Office of the Academic Integrity Subcommittee decision, a student can submit a written appeal to the respective Dean of the course that must address one or both of the following issues for appeal:
- new evidence that was not reviewed by the Academic Integrity Subcommittee and/or
- any evidence that the review process was improper or unfair.
- An appeal letter that does not clearly identify one or both of the issues listed above shall be dismissed without further consideration. The respective Dean of the course will make an initial assessment of a valid appeal after reviewing the incident file provided by the Registrar’s Office and, if necessary, by communicating with relevant parties such as staff or administrators.
- For a valid appeal request, within ten (10) days the respective Dean of the course will schedule a meeting of an Appeal Committee consisting of:
- Chief Academic Officer (or designee), who will serve as chair;
- Associate Vice President of Academic Affairs-Online Operations (only if the course is an online course);
- Dean (or administrative designee) of each of the colleges;
- Two full-time faculty members appointed by the Faculty Council who teach outside of the department of the student, have had minimal academic interaction with the student, and who have been at the Doane University at least one year; and
- Registrar (or designee).
The Registrar and respective Dean of the course can be participants in the discussions but will be non-voting members in determining a course of action. All members or their designees must participate for deliberation and decision.
- The Appeal Committee will perform due diligence in reviewing an incident. As part of the due diligence, the Committee will review all relevant documentation and may consult with relevant parties such as students, faculty, the Academic Integrity Subcommittee, staff, or administrators for information, guidance, and/or clarification. The Committee will review the prior decisions for consequence(s) by the faculty member and by the Academic Integrity Subcommittee, as well as review the history in the student’s file.
- The Appeal Committee will make a determination to support the consequence(s) or determine different Course Level consequence(s) to ensure consistency across the University or impose a University Level consequence(s) for the violation.
- A majority decision by the Appeal Committee is final and ends the appeal process for an academic integrity violation.
- Within two (2) business days, the Registrar’s Office will communicate the majority decision of the Appeal Committee to the student, the faculty member, and the Academic Integrity Subcommittee.
The policy is based on similar academic integrity policies developed by Nebraska Methodist College and University of Nebraska-Lincoln.
SECTION 1.06: Computer Use Policy and Procedures
The purpose of this computer policy (“Policy”) is to set forth guidelines so that members of the Doane community may use the campus network and computing facilities in ways that are responsible and respectful of privacy.
This Policy applies to all users of Doane University’s (“University”) information systems, including students, faculty and staff, and any others granted the use of University information systems and data. It applies to the use of all computing facilities owned, leased, operated, or contracted by the University. As used in this Policy, terms such as “computing,” “computer/information resources,” “devices,” etc., refer to all computers, communication systems and peripherals, internet of things, software, telephones, and systems with similar functions, which are owned or leased by the University, or that utilize University infrastructure such as telephone lines or computer networks.
Although this Policy does not attempt to deal specifically with legal issues, University members are responsible to act in compliance with the law, including any federal, state, and local laws governing computer and telecommunications use as well as all other applicable University policies.
Privileges and Responsibilities
Every member of the Doane community who uses computing and related communications systems at the University or systems that belong to the University or that rely on the University’s infrastructure has the responsibilities described in this Policy. This includes members of the Doane community who have restricted privileges, such as alumni who may have electronic mail access only. Individuals with personally owned devices but who rely upon the University’s network to connect those devices are expected to abide by the policies set forth in this document. Personally owned devices operating independently or networked through a non-university connection are not covered under this Policy.
Access to the University’s information systems is contingent upon being a member of the University community and adhering to University and Information Systems policies, guidelines, and procedures, including this Policy. Misuse may result in the loss of access and/or University disciplinary action. For some users and certain systems, access may be authorized by specific departments. In such cases, any department- or group-specific policies and guidelines must be adhered to when using resources provided by the department or group. This is in addition to University policies and Technology Services guidelines and procedures.
Any user who suspects a violation of the University’s Information Systems use policies or has knowledge of potential vulnerabilities or security loopholes in a system or network at the University should immediately notify the Information Security Team at firstname.lastname@example.org.
Maintain the Security and Confidentiality of your Account
Users assume personal responsibility for the actions associated with their computer accounts. This responsibility begins with selecting a secure password and involves maintaining the confidentiality of that password and changing the password regularly and/or enabling multi-factor authentication in order to assure the continued security of your account. For guidance in selecting a secure password and/or enabling multi-factor authentication, please contact the Help Desk. If you believe that someone has made unauthorized use of your account, you should change your password immediately and report the incident to the Help Desk at email@example.com.
Respect for Others’ Property and Privacy Rights
Users are responsible for respecting copyright agreements and intellectual property ownership. Any material that is the work of another, whether explicitly copyrighted or not, should not be distributed by any user without the appropriate acknowledgment and/or permission of the creator. Unless permission has been granted by the owner of copyright-protected materials, distribution of copyright-protected material via the university network or information systems is prohibited.
Any communications that would be improper or illegal on any other medium are equally so on information systems: libelous material, obscene messages, harassment, forgery, threats, etc. However, this is not intended to restrict the free expression of ideas. Communication conducted in accordance with University policies with the statement on Academic Freedom and Responsibility will not be considered a violation of this Policy.
Risks of Data Loss and Data Persistence
Although the University will make efforts to secure the network and University-controlled servers from abuse and damage, it cannot guarantee against data loss by a student, faculty, or staff member, on a University-operated or an individually owned device.
While the University makes information systems available primarily to achieve its goals of academic advancement and for administrative activities, it realizes the need to encourage the personal use of computing for the convenience of the campus community. Thus, it is reasonable to allow the use of information systems for activities that can facilitate convenience or enhance productivity, to the extent that the activity is within the limits described by the Information System’s Policies. Any personal use of Information Systems related to operating a personal business or commercial enterprise is prohibited unless permission to do so has been specifically granted by the Chief Information Officer.
The user must presume that the contents of any other users’ directory are private unless expressly designated otherwise, just as one would presume that the contents of someone’s apartment or office are private. An unprotected account or shared device is not considered to be public unless the name or service expressly indicates that it is. In such cases, any files or other data that would appear to be private in nature, by virtue of the file name or data stored, even if “publicly accessible” should be considered to be private. The user accessing such files has a responsibility to ask the owner of the files or service if the files are intended to be publicly accessible before the user does more than a “cursory glance” sufficient to cause the question.
A user can explicitly grant access to his or her directories and files. However, users who issue general or vague invitations to browse through their files incur a special obligation to project any material that they do not wish others to see. Indeed, all users are urged to maintain projection levels on their files consistent with the access they are actually willing to give other users.
Access to User Data
Electronic data on a user’s account, whether stored on a computer in the user’s office/room or elsewhere under the proprietary control of that user, may not be examined without the user’s consent, except in cases of emergency or by the employee’s supervisor for the purpose of accessing work-related electronic data. Posting of data by a user on the platforms available to the public or to users of the University shall be understood to imply consent, and electronic access given to specific parties by the user will likewise imply consent for those parties to access permitted data. Emergencies may include, for example, but are not limited to, the death, incapacity, or disappearance of the user, or the search for and examination of files used for apparently malicious activity in an account that endangers the integrity of Information Systems, the network, or other aspects of the University’s computing infrastructure.
Only specifically designated individuals are permitted to determine what passes for an “emergency.” Such individuals may be specifically designated or may be designated by job position/description for employees. For students, the Vice President of Student Affairs will be designated to determine what is defined as an “emergency” aside from what was stated above.
Whenever possible and legally permissible, the notification must be given to the user whose data are subject to subpoena, search warrant, or order of court prior to compliance therewith. Any intrusion by an employee of the University into a user’s electronic data must be reported to the user as soon as possible, and within five days of the event via electronic mail unless prohibited by order of court, or due to a continuance of an ongoing investigation by the University. Violation of any aspect of this Policy is a sanctionable offense.
In cases where a staff member believes that electronic data in their account has been inappropriately accessed by another staff member, the incident should be reported to Human Resources. For students, it should be reported to the Vice President of Student Affairs.
Note: Removable media such as in a faculty or staff office, or in a residence hall suite are not subject to search by Technology Services, though Technology Services will assist authorized law enforcement agencies or authorities to read data after they are obtained, at the agencies’ or authorities’ request.
Protecting Confidential Information
Users who maintain confidential information, such as records relating to employees or students, are responsible for following privacy-related policies, laws, and data use agreements.
Protecting Personal Information
As is described throughout this Policy, data transmitted across the University’s network or stored on University systems may be accessed by others as a result of misuse by an individual, as an incidental result of the routine operation of the network and systems, or in response to a court subpoena or University investigation into suspected or alleged misuse. While complete privacy of personal data may not be possible, users who wish to ensure a higher degree of privacy for their data are encouraged to use encryption, PGP security, or other techniques to reduce the risk that others may access their data.
Misuse and Inappropriate Behavior
The following activities are expressly prohibited at Doane University
- Using a computer system without proper authorization granted through a University official. Some activities such as “port scanning” are not expressly prohibited. However, if the target of such scanning request that an individual or system stops performing such actions, the person or system performing the scans must stop scanning the target machine and/or networks unless the scans are being carried out by a Privileged User who has the authority and responsibility over the machine(s) being scanned or for the network being used.
- Concealing your identity or assuming the identity of another (e.g., by sending forged electronic mail). Note that some forms of electronic communication, such as browsing web pages, passively “identify” users. Keeping your identity private either by not setting an identity in your browser or by using a Web-Anonymizer in order to protect yourself from being put onto mailing lists is not a violation of this Policy.
- Using another person’s computer account, user id, files, or data without appropriate permission, as described in the previous bullet (e.g., using an account found “logged in”).
- Deleting or tampering with another user’s files or with information stored by another user on any information-bearing medium (disk, tape, memory, etc.). Even if the user’s files are unprotected, apart from files obviously intended for public reading, such as web pages, it is improper for another user to read them unless the owner has given permission (e.g., in an announcement in class).
- Attempting to “crack” or guess other users’ passwords. Privileged Users or those specifically designated by the administrator or owner of a system may attempt to crack passwords in order to test and enhance the security of the system. In cases where an individual or department “owns” machines that use password files controlled by another organization (e.g., Information Security course machines or their like), the owner may not attempt to crack passwords without explicit permission from the owners of the password database.
- Obtaining passwords by other means, such as password capturing, phishing, and key logging programs.
- Attempting to circumvent system security (e.g., breaking into a system or using programs to obtain “root” or “administrative” access), without the explicit permission of the owner of that system.
- Denying permitted and appropriate access to resources to other users (e.g., Denial of Service attacks).
- Releasing malicious code, malware, etc., that disrupt other users, damage software or hardware, disrupt network performance, or replicate themselves for malicious purposes.
- Sending commercial solicitations via electronic means (i.e., spamming) to individuals or to newsgroups or mailing lists where such advertising is not part of the purpose of the group or list.
- Any “mass mailing” that is solicitous in nature, unless the mailing is in the conduct of University business.
- Reselling of services based on the University network, such as web hosting, mailing services, or the selling of shell accounts.
- Running a proxy service that results in inappropriate or unauthorized access to University materials to non-University members.
- Advertising commercial businesses or ventures on web pages hosted by Doane, unless prior authorization has been granted.
- Using mail messages to harass or intimidate another person (such as by repeatedly sending unwanted mail or broadcasting unsolicited mail).
- Violations of any local, state, or federal laws, such as the distribution of copyright-protected materials (e.g., the distribution of commercial software, music, or films in electronic format without appropriate permissions by the owner, even if the user distributing the materials notifies others of their copyright status).
- Tampering with, willful destruction of or theft of any computer equipment, whether it belongs to the University or an individual. Tampering includes any deliberate effort to degrade or halt a system, or to compromise the system/network performance. Willful destruction includes any deliberate disabling or damaging of computer systems, peripheral equipment such as scanners or printers, or other facilities or equipment including the network, and any deliberate destruction or impairment of software or other users’ files or data.
- The unauthorized removal of the University’s or another person’s computer equipment constitutes theft.
This list should not be considered to be complete or exhaustive. It should, however, serve as a set of examples of obviously inappropriate behaviors. If you are in doubt about the appropriateness of something that you want to do, contact the Help Desk and ask first.
Inappropriate behavior in the use of computers is punishable under the Information Security policies and regulations regarding faculty, staff, and students. The offenses mentioned in this policy range from relatively minor to extremely serious, though even a minor offense may be treated severely if it is repeated or malicious. Certain offenses may also be subject to prosecution under federal, state, or local laws.
Appropriate disciplinary action depends not only on the nature of the offense but also on the intent and previous history of the offender. The range of possible penalties includes reprimands, loss of computing privileges, course failures for students, disciplinary probation, suspension or dismissal from the University, and/or criminal prosecution.
Offenses that are minor or appear to be accidental in nature are often handled in a very informal manner, such as through electronic mail. More serious offenses involve formal procedures pursued through Student Affairs for students, Human Resources, and/or the respective Vice President for staff and faculty.
Restrictions of Privileges During Investigations
During the course of an investigation of the alleged inappropriate or unauthorized use, it may be necessary to temporarily suspend a user’s network or computing privileges, but only after determining there is at least a prima facie case against the individual, as well as a risk to the University or its information resources if privileges are not revoked. In these cases, it is important to recognize that the restriction of network or computing privileges is intended to protect the system rather than to punish the individual. For example, if a computer account has been used to launch an attack on another system, that account will be rendered inactive until the investigation and/or response effort is complete. This is a necessary action taken to prevent further misuse and does not presume that the account holder initiated the misuse. Unsubstantiated reports of abuse will not result in the suspension of accounts or network access unless sufficient evidence is provided to show that inappropriate activity occurred. For example, if someone reports that their computer was “attacked” by a Doane system, the burden will be upon the complainant to provide sufficient data logs or other evidence to show that the incident did, at least, appear to be an attack.
Adverse Impact on Shared Systems
The University reserves the right to discontinue communication with external systems that are known to harbor malicious actors and/or content (e.g., spammers, account crackers, and phishing sites) even though this may restrict certain acceptable communications. When deemed necessary, this action will be taken to protect the security and safety of our systems. Similarly, there may be cases where a particular service or activity on a given University system will, by the very nature of its legitimate operation, tend to generate attacks from other internet sites. If these attacks are frequent and severe enough to cause service interruptions for larger parts of the campus community, it may be necessary to temporarily or permanently remove these systems from the campus network. In cases where such action is deemed necessary, network administrators will work with the maintainers of the system to identify alternative methods of network access. In cases where the University restricts access to external sites or removes network access for internal sites, the purpose of the action is to maintain the security and reliability of the computer systems and networks rather than to punish an individual or a site, or to restrict the free expression of ideas.
SECTION 1.07: Abuse/Misuse of Resources
Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services, or equipment. This includes, but is not limited to:
- Threatening or harassing others. This includes electronically transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or Doane University regulations.
- Propagating viruses or worms.
- Posting or mailing of obscene materials.
- Displaying obscene, lewd, or sexually harassing images or text on a computer owned by Doane University or in a location that may be easily viewed by others.
- Distributing unsolicited advertising, initiating or propagating electronic chain letters, inappropriate mass mailing, including multiple mailings to newsgroups, mailing lists, or individuals, e.g. spamming” flooding,” or “bombing,” or random mailing of messages.
- Impersonating another user or entity while using Doane University technology resources or services in such a manner as to create the impression to the recipient that the information was originated from another source or individual. All materials sent via the University network must be attributed to the individual, office or organization sending the material.
- Using the University network to gain unauthorized access to any computer systems (including other student-owned computers).
- Connecting unauthorized equipment to the University network (this includes personal hubs, switches, routers, wireless access points, servers, and any other devices that may have a negative effect on network performance or services).
- Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
- Associating an unapproved domain name with a Doane University-owned IP address or resource.
- Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks (this includes downloading excessive amounts or transferring excessive amounts across the network).
- Deliberately wasting/overloading computing resources, such as printing too many copies of a document or using excessive bandwidth on the network. Individuals who are misusing resources will be notified and given an opportunity to adjust their usage. If the individual does not voluntarily comply, access for that individual will be electronically restricted.
- Using Doane University resources for commercial activity such as creating products or services for sale.
- Forging or disguising the identity of a user or machine in an electronic communication.
- Attempting to monitor or tamper with other user’s electronic accounts; communications; or reading, copying, changing, or deleting another user’s files, profiles or software without the explicit agreement and knowledge of the owner.
- Violating copyright laws and their fair use provisions through inappropriate reproduction, downloading, and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc. Note: all Doane network users are expected to comply with the copyright laws of the United States, regardless of the location of the server from which they are downloading.
- Violations of the Doane University Acceptable Use Policy are subject to action by the University. Violations will be referred to the Vice President for Information Technology, who will report issues and problems for review by the appropriate Administrator or the Vice President for Student Affairs and the Vice President of Academic Affairs, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to dismissal, suspension, loss of network and computing privileges, and/or legally prosecuted.
SECTION 1.08: Copyright Infringement
The software used by the institution is protected under federal Copyright Law. All students, staff, and faculty must comply with these regulations. It is illegal to make personal copies of software unless specifically allowed by a license agreement. Questions regarding specific instances should be directed to a professional staff member of Information Technology Services.
Students found in possession of illegal copies of software (either copies they have made or acquired by other means, or copies of software designated for use in class sessions or through the library that have not been issued to a student) will be subject to disciplinary action.
Copyright Law and Fair Use
Students, faculty and staff have an obligation to practice high copyright standards and comply with policies and laws.
Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) passed by Congress in 1998, makes it illegal to copy or share intellectual property–music, videos, games, software and other materials–without permissions. Doane University adheres to the regulations and guidelines outlined by the DMCA.
Fair Use comprises Section 107 of the Copyright Act and was set up in recognition that free exchange of information is beneficial. Four standards are applied: the purpose and character of the use; the nature of the copyrighted work; the amount and substantially of the portion used; and the effect of the use on the publisher’s potential market.
However, the vast majority of online music and video sharing is done in ways that do not constitute fair use. The good news is that there are legal sources.
Legal online sources for copyrighted materials
There are many legal sources for copyrighted material such as music and movies; some are even free. Additional resources can be found on our website at www.doane.edu/technology.(link needs fixed)
Information Privacy and Security
Doane University reserves the right to monitor electronic activity of users when there is activity that appears to be harmful to another user, to the campus system and/or network (programs being launched to attack the servers, users attempting to break into accounts, etc.), or when there is evidence of violations of the appropriate use policy.
When there is no evidence of an appropriate use violation or threat to the Doane University system or network, computer users have the right to expect that their materials remain private. No person, regardless of status (i.e., including the system manager, faculty member or university administrator) may view, change or remove another user’s files without the user’s permission, whether the material exists on network media or on a user’s own media. An exception exists for class accounts which are owned and managed by an instructor or system manager and which exists strictly for a class project and which excludes personal electronic mail. In these cases, the administrator of the account is allowed complete access, but persons outside of the class are not. Documents stored on public use computers (labs) have no expectation for privacy and documents may be deleted at any time.
Doane University will actively monitor electronic security measures; however, users should be aware that no information system is completely secure. Persons both within and outside of the university may find ways to access files. Therefore, the university does not guarantee user privacy.