Information Technology Policies

Information Technology Cluster Policies

Computing Policies

1. Illinois College reserves the right to limit access to its networks.

2. Where feasible, Illinois College will remove or limit access to material on Illinois College-owned computers that violates other applicable Illinois College policies or code, contractual obligations, or state and federal laws.

3. Where time is of the essence, temporary restrictive actions may be taken by systems or network administrator(s) pending decisions of Illinois College Administrators or other appropriate authorities, or until the matter is finally adjudicated.

Inappropriate Use of College Computers and Network Systems

The computing facilities are not to be used for the following activities:

  • Illegal or fraudulent purposes
  • Entertainment
  • Large Mailings
  • Tying up work stations
  • Large print jobs
  • Forged mail or postings
  • Personal or commercial gain
  • Printer is not to be used as a copier
  • Giving out passwords
  • Software piracy
  • Unlicensed copying of copyrighted material

Respecting Privacy

Only authorized users have access to administrative data. Examining and /or making unauthorized changes to this data are direct violations of Illinois College's standards of ethical conduct.
Unauthorized access to another person's account to view their files is also a violation of these standards. This includes, but is not limited to, accessing the files of another student, professor, or colleague.

Obeying Copyright Laws

It is against the law to copy commercial software that has not been placed in public domain or distributed as freeware. Software piracy injures all of us. It reduces the incentives for the software industry to invest in new software projects; it substantially reduces the willingness of vendors to support computing at Illinois College through attractive discount programs and it makes us vulnerable to criminal prosecution. But worse than any of these, software piracy is morally wrong - indeed, it is ethically indistinguishable from shoplifting or theft.

Sharing of Limited Resources

While Illinois College enjoys a high-quality computing environment, during peak periods demand for computing resources may exceed supply. Be sensitive to the needs of all those who seek to use Illinois College's resources, and limit your use of these resources to performing only the most essential academic tasks during periods of peak demand.

Civil Standards of Communication

Within the broad context of free academic discussion and debate, communications between members of the College community are expected to reflect high ethical standards and mutual respect and civility. It makes no difference whether the communication medium is a face-to-face exchange or a local or nation computer network. The use of obscene, racist, or sexist language clearly violates the ethical standards of the Illinois College community and is as inappropriate for computer-mediated communication as for other forms of College discourse.

Violations of the Intellectual Integrity Related to use of Computers or Network Systems

Related to the Use of College Computers or Network Systems

1. Accessing, or attempting to access, another individual's or entity's data or information without proper authorization regardless of the means by which this is accomplished; and to give another individual the means with which to access such data or information.

2. Supplying, or attempting to supply, false or misleading information or identification in order to access computers or network systems, or to access data or information stored in or transmitted across computers or network systems.

3. Improperly obtaining another's password; or improperly obtaining or using another's password to access computers or network systems, or to access data or information stored in or transmitted across computers or network systems.

4. Inspecting, modifying, distributing or copying proprietary data or software without proper authorization. It is also a violation to give another individual the means by which to inspect, modify, distribute or copy proprietary data or software.

5. Subverting or obstructing, or attempting to subvert or obstruct, the operation of any computer or network system such as by introducing a virus, worm, or other rogue program in the system; or modifying, altering or otherwise tampering with the system's hardware or software; or hoarding computer or network resources.

6. Initiating or encouraging the promulgation of chain letters or other types of electronic broadcast messages.

Violations of the Campus Code of Conduct

Policy on Responsible Use of Electronic Communications Services

The College may restrict the use of its computers and network systems for electronic communications, that is, the communicating or posting of information or material by way of electronic mail, bulletin boards, or other such electronic tools, when faced with evidence of violations of other College policies or codes, or state or federal laws.

The College reserves the right to limit access to its networks through College-owned or other computers, and to remove or limit access to material posted on College-owned computers. The College encourages all members of its community to use electronic communications in a manner that is respectful to others. The College also wishes to enforce its policies regarding harassment and the safety of individuals; to protect the College against seriously damaging or legal consequences; to prevent the posting of proprietary software or the postings of electronic copies of literary works in disregard of copyright restrictions or contractual obligations; to safeguard the integrity of computer, networks, and data, either at the College or elsewhere.

Computers and network systems offer powerful tools for communication among members of the College community and of communities outside of the College. When used appropriately, these tools can enhance dialogue and communications. When used unlawfully or inappropriately, however, these tools can infringe on the beliefs or rights of others. The College cannot protect individuals against the existence or receipt of material that may be offensive to them. As such, those who make use of electronic communications are warned that they may willingly or unwillingly come across or be recipients of material they find offensive. The College cannot control the posting of material on computers it does not own, even if such computers are attached directly to College networks. The college may, however, limit access to such networks.

Furthermore, the College, cannot, in general, prevent the transmission of electronic communications across its networks based on the content of material transmitted, whether or not such material originates inside or outside of the College.

Illinois College IT Policy for Migrating Departmental File Server Shares to Google Drive

General Policies

Each device that will be utilized to access sensitive Illinois College data (anything containing strategic planning, budget, student data, emails to and from students, etc) via Google Drive must have a security unlock pin code enabled (meaning the device can’t be used until the security code is entered) and that code should only be known by the owner of the device.

In addition, all use of Google Drive with sensitive data must be carried out on devices using dual factor authentication, which will not allow the user to login until they input a pin code that will be texted to their personal mobile device. This will prevent unauthorized access to the account as the attacker would need both the user's password and their personal mobile device (cell phone) to gain access. IT is more than happy to personally assist each user with enabling and configuring two factor authentication.

It is recommended, but not required, that all devices used to access sensitive Illinois College data via Google Drive are either owned by Illinois College or brought to IT so the Meraki security software can be installed. This allows the IT department to completely wipe the device in the event that it is stolen and you report that to us. It also allows us to track the device if it is stolen and the perpetrator connects to the internet.

Illinois College Web Page Policies

General Web Page Policies

Illinois College allows any student or organization that has an account to create their own World Wide Web Home Page. The views and ideas expressed in these pages are not necessarily those of Illinois College. The students or the creators of organization's pages accept full responsibility for their content. Any student or organization found not following the guidelines of the Illinois College computing policies, the Web Page Policies or the Community Standards and expectations as listed in the Blue Book under Illinois College Policies and Procedures can have their web page taken away from them by the Web Administrators. Following is a list of those policies and guidelines.

Policies:

1. The account is to be used as stated in the Illinois College Computing Policies.

2. Each student is responsible for maintaining his/her own web page.

3. As stated in the Illinois College Computing Facilities Use Policy, where time is of the essence, temporary restrictive actions may be taken by systems or network administrator(s) pending decisions of the Deans Office through the Disciplinary Procedures of the College, or until the matter is finally adjudicated.

Guidelines:

1. The copying of someone else's work for the use on your page is plagiarism. Any page found with plagiarized material can be shut down. This is also a violation of the Intellectual Integrity policy of Illinois College.

2. Copyrighted material is not to be displayed on any web page, unless the student or organization has written consent of the owner of the copyright.