Oct 06, 2022  
ARCHIVED 2013-14 SA&S Crete Campus Catalog 
ARCHIVED 2013-14 SA&S Crete Campus Catalog [ARCHIVED CATALOG]

Article II. Academic Integrity

Academic Integrity Policy

In order for Doane College to provide, clarify, and preserve an atmosphere in which individuals can strive for academic excellence, the following policy is stated to deter acts of academic dishonesty. Academic dishonesty, the act of knowingly and willingly attempting or assisting others to gain academic success by dishonest means, is manifested in various measures. Gehring, et al, (1986) suggests that four categories of academic dishonesty exist1:

  1. Cheating
  2. Fabrication
  3. Facilitating academic dishonesty
  4. Plagiarism

The college has chosen to identify those same categories and to apply them in a manner that is appropriate for the Doane setting. Provided with each category is the respective gathering definition and list of isolated, but not inclusive, examples of infractions. It must be noted that the essential, qualifying characteristic that must be implied with each is that the instructor must consider the alleged offense to be dishonest.

1 Gehring, D, Nuss, E. M., & Pavela, G. (1986). Issues and perspectives on academic integrity. Columbus, OH: National Association of Student Personnel Administrators (NASPA).

Section 2.01 Academic Dishonesty

  1. Cheating - "Intentionally using or attempting to use unauthorized information or study aids in an academic exercise" (Gehring,et al p.6). Examples are (list is not all-inclusive):
    1. Intentionally using an unauthorized source to complete an objective. This may include such infractions as looking at another's paper during an exam and/or using unauthorized, pre-written responses or electronically stored information such as "crib notes" and computer disks.
    2. Submitting someone else's work as one's own research or data.
    3. Allowing another to complete an exam in one's stead.
    4. Submitting a project that has been or is currently being used to satisfy requirements for another course without the explicit permission of both instructors.
    5. Improper collaboration on projects beyond that permitted by the instructor.
  2. Sharing information between exams in multiple sections of a course.
  3. Fabrication - "Intentional and unauthorized falsification of invention or any information or citation in an academic exercise" (Gehring, et al, p. 6). Examples (list is not all-inclusive):
    1. Supplying fabricated "dry lab" data for an experiment or laboratory project.
    2. Fabricating all or a portion of a bibliographic entry for a document or project.
  4. Facilitating Academic Dishonesty - "Intentionally or knowingly helping or attempting to help another to commit an act of dishonesty (Gehring, et al, p. 6) and/or coercing others to do the same. Examples (list is not all-inclusive):
    1. Allowing one's own work to be submitted as another's work for a course project.
    2. Providing or offering unauthorized aid to another for a course objective. This would include allowing another to observe one's answers on an exam.
    3. Making threats or offers of compensation to others in order that those threatened or coerced will provide unauthorized aid for course projects.
    4. Unauthorized acquisition or subsequent use or possession of stolen materials. This would include the distribution of said materials to others and also constitutes the additional infraction of cheating for all those who acquired, distributed, used or passed the stolen materials.
  5. Plagiarism - "Intentionally or knowingly representing the words or ideas of another as one's own in any academic exercise," (Gehring, et al,p. 6) in both oral and written projects. Examples:
    1. Purchasing a paper from a commercial or private source, using a paper from an organization's files, copying sections or chapters from reference works or borrowing or stealing another's paper and submitting it as one's own work.
    2. Failing to indicate a direct quote from a reference source by using quotation marks and proper citation of the source.
    3. Attempting to represent the work, words, and ideas of another (paraphrasing) as one's own without proper citation or documentation.
    4. Failing to acknowledge information obtained in one's reading or research that is not common knowledge.

Section 2.02 Sanctions for Academic Integrity

The process is initiated when a faculty member files a complaint for alleged act(s) of academic dishonesty or misconduct. The faculty member will write up the incident and file a copy of the formal complaint with the Chair of the Academic Integrity Committee, who will forward the complaint to the Academic Affairs Office. Copies of any documents of evidence must be provided to the Academic Affairs Office. Before the Charge of Academic Integrity Violation complaint form is filed, the student must sign the form to show that he/she has been info med of the charges. Only the Chair of the Academic Affairs Integrity Committee will check to see if this is a first or subsequent charge(s) for the student.

The faculty member will retain discretion with regard to the sanctions for the offense in the case of a first offense. However, sanctions will not be imposed until the faculty member receives written notification from the Academic Integrity Committee concerning the outcome of the meeting between the committee and the student. If a student is charged and found guilty of a subsequent offense, the faculty member may impose sanctions for the course; however, the committee may impose additional sanctions. In cases where the faculty member is a parent or close relative of the student involved, the faculty member is required to submit documents related to suspected academic dishonesty to the Department Chair or Vice President for Academic Affairs for evaluation and processing pursuant to the steps below.

Section 2.03 First Offense

  1. Once the charge has been filed, the student will be notified of when to appear before the Academic Integrity Committee. At this time, students will be notified that they may have an advocate appear before the committee with them. If the student fails to appear at the set time without an excuse acceptable to the Committee, the charges will be automatically confirmed.
  2. If the student admits to the charge, he/she will appear before the committee to discuss academic integrity. The complaint and accompanying documentation will be filed with the Academic Affairs Office. The faculty member will be informed concerning the outcomes of the meeting and will impose sanctions for the course. If the student decides to appeal the charges, he/she is required to notify the chair of the Academic Integrity Committee in writing within 72 hours after receiving the initial notice. Committee members will hear testimony from the student and faculty member who has been asked to be available at the time of the meeting) and will have the opportunity to ask the student questions as well as inform the student on issues related to academic integrity. Students may provide evidence on their behalf.
  3. Based on the testimony, the Committee will either confirm or rescind the charges. [NOTE: If the charges are rescinded, the student is exonerated and all documentation sent to the Academic Affairs Office and the Chair of the Committee will be destroyed immediately. If the charges are confirmed, the complaint and accompanying documentation will be kept only in the Academic Affairs Office for a period of seven years for record-keeping purposes (i.e. to establish whether or not a student has a prior complaint). At the end of the seven-year period, all documents concerning this charge are destroyed.]
  4. If appealing or denying the charges, the student will be informed at the end of the meeting when the written decision of the Committee will be sent to the student through campus mail and that the student will need to sign for the letter during the next two weeks. The student has the right to appeal the Committee's decision to the Vice President for Academic Affairs within 72 hours after receiving the Committee's written decision. If the student has not signed for the written decision in the two weeks after the date of the letter, it will be assumed that the student does not wish to appeal. The faculty member will be informed of the Committee's decision and will impose sanctions for the course.
  5. If the charges are confirmed, the student's adviser will also be informed of the charges and the sanction(s) in writing.

Section 2.04 Subsequent Offense(s):

If a complaint is filed by a faculty member and it is determined that this is a subsequent offense for the student, the following procedures will take effect:

  1. If the Committee confirms the charges, the Committee has the right to impose additional sanctions for the second offense, including possible suspension or expulsion from the College.
  2. The student has the right to appeal the Committee's decision to the Vice President for Academic Affairs within 72 hours after receiving the Committee's written decision.

Section 2.05 Computer Use Policy and Procedures

Information technology and resources include, but are not limited to: computers, software, databases, files, computer accounts, networks, Internet access, and electronic communication. The following are guidelines for acceptable use of information technology at Doane College.

The use of information technology and resources is a privilege extended to Doane College students, faculty, and staff. That use is restricted to academic, educational, research, and/or administrative purposes. These resources may not be used for commercial or business income purposes unless specific, written authorization for such use is given by the College. Any reselling of Doane's network services is prohibited.

All use of information technology and resources must comply with federal, state and local laws, licensing and purchasing agreements, and Doane policies. Users of outside facilities such as libraries, Internet, or other electronic communication facilities must also comply with the acceptable practices and restrictions established by those facilities.

Individuals may not use institutional resources without proper authorization from the assigned user of the resource. Individuals may not use another user's computer account or user I.D. or change another user's password without prior permission from the assigned user. Users are responsible for their use of computer hardware, software, accounts, user I.D.s and passwords. Users are responsible for all resources assigned to them even if another person uses them.

Users must not access, copy, view or change private files without authorization. They may not change, create, or delete public files or directories without proper authorization. Users do not have the right to create or receive unauthorized copies of software. Users must not attempt to modify software, data, or systems in an unauthorized manner.

Information technology and resources must not be used to make unauthorized entry into other communications, computational, or informational devices or resources. Accessing restricted databases requires authorization.

Section 2.06 Abuse/Misuse of Resources

Users must not misuse or abuse any information resources. Information technology and resources must not be used to disrupt or interfere with other users, services, or equipment. This includes, but is not limited to:

  1. Threatening or harassing others. This includes electronically transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws or Doane College regulations.
  2. Propagating viruses or worms.
  3. Posting or mailing of obscene materials.
  4. Displaying obscene, lewd, or sexually harassing images or text on a computer owned by Doane College or in a location that may be easily viewed by others.
  5. Distributing unsolicited advertising, initiating or propagating electronic chain letters, inappropriate mass mailing, including multiple mailings to newsgroups, mailing lists, or individuals, e.g. spamming" flooding," or "bombing," or random mailing of messages.
  6. Originating e-mail in such a manner as to create the impression to the recipient that the mail was originated from another source or individual. All materials sent via the campus network must be attributed to the individual, office or organization sending the material.
  7. Using the campus network to gain unauthorized access to any computer systems (including other student-owned computers).
  8. Connecting unauthorized equipment to the campus network (this includes personal hubs, switches, routers, wireless access points, servers, and any other devices that may have a negative effect on network performance).
  9. Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data.
  10. Associating an unapproved domain name with a Doane College-owned IP address.
  11. Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks (this includes downloading excessive amounts or transferring excessive amounts across the network).
  12. Deliberately wasting/overloading computing resources, such as printing too many copies of a document or using excessive bandwidth on the network. Individuals who use excessive amounts of bandwidth will be notified and given an opportunity to adjust their usage. If the individual does not voluntarily comply, access for that individual will be electronically restricted.
  13. Using Doane College resources for commercial activity such as creating products or services for sale.
  14. Forging or disguising the identity of a user or machine in an electronic communication.
  15. Attempting to monitor or tamper with other user's electronic accounts; communications; or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner.
  16. Violating copyright laws and their fair use provisions through inappropriate reproduction, downloading, and/or distribution of music (including MP3 files), movies, computer software, copyrighted text, images, etc. Note: all Doane network users are expected to comply with the copyright laws of the United States, regardless of the location of the server from which they are downloading.
  17. Violations of the Doane College acceptable use policy are subject to action by the College. Violations will be referred to the Vice President for Information Technology, who will report issues and problems for review by the appropriate Administrator or the Dean of Student Leadership and the Academic Dean, and will be referred to the appropriate administrative or judicial proceedings. Violators may be billed or fined for unethical or illegal use of information technology. They may also be subject to dismissal, suspension, loss of network and computing privileges, and/or legally prosecuted.

Section 2.07 Copyright Infringement

The software used by the institution n protected under federal Copyright Law. All students, staff, and faculty must comply with these regulations. It is illegal to make personal copies of software unless specifically allowed by a license agreement. Questions regarding specific instances should be directed to a professional staff member of the Office of Technology.

Students found in possession of illegal copies of software (either copies they have made or acquired by other means, or copies of software designated for use in class sessions or through the library that have not been issued to a student) will be subject to disciplinary action.