Quicklinks
myMILLIKIN |
Search
Millikin Home
Big Blue RSS
Millikin University - Decatur, IL
The Individual's Responsibilities 
Millikin University > Information Technology > Technology Policies > Individual's Responsibilities

Millikin University supports networked information resources to further its mission of research and instruction and to foster a community of shared inquiry. All members of the University community must be cognizant of the rules and conventions that make these resources secure and efficient. It is the responsibility of each member of the University community to:

Respect the right of others to be free from harassment or intimidation to the same extent that this right is recognized in the use of other media or communications.

Respect copyright and other intellectual-property rights. Unauthorized copying of files or passwords belonging to others or to the University may constitute plagiarism or theft. Modifying files without authorization (including altering information, introducing computer viruses or damaging files) is unethical, may be illegal, and may lead to sanctions.

Maintain secure passwords. Users should establish appropriate passwords according to the guidelines set out by the IT Department, change them when notified, and not share them with others.

Use resources efficiently. Accept limitations or restrictions on computing resources -- such as storage space, time limits, or amount of resources consumed -- when asked to do so by systems administrators.

Recognize the limitations to privacy afforded by electronic services. Users have a right to expect that what they create, store, and send will be seen only by those to whom permission is given. Users must know, however, that the security of electronic files on shared systems and networks is not inviolable--most people respect the security and privacy protocols, but a determined person can breach them. Users must also note that, as part of their responsibilities, systems or technical managers may occasionally need to diagnose or solve problems by examining the contents of particular files.

Learn to use software and information files correctly. Users should maintain and archive backup copies of important work. Users are responsible for backing up their own files. They should not assume that files on shared machines are backed up. They should learn to properly use the features for securing or sharing access to their files.  The university encourages individuals to use their designated network drive (home directory) to store copies of their documents.

Abide by security restrictions on all systems and information to which access is permitted. Users should not attempt to evade, disable, or "crack" passwords or other security provisions; these activities threaten the work of others and are grounds for immediate suspension or termination of privileges and possible additional sanctions.

Student and employee owned computers, which are connected to the network, are required to have an updated anti-virus program installed. If any student or employee owned computer becomes a security or virus threat to the network, IT reserves the right to restrict its access to the network, this includes file sharing or student operated servers in residences.

Millikin University extends these principles and guidelines to systems outside the University that are accessed via the University's facilities (e.g., electronic mail, social networking sites, or remote logins using the University's Internet connections). Network or computing providers outside Millikin University may also impose their own conditions of appropriate use, which users at this University are responsible for following.

Sanctions

Individuals or groups who act in a manner contrary to existing policy and accepted standards for computer use are subject to the sanctions and disciplinary measures normally applied to misconduct or lawbreaking. Computing policy violations are handled by established University channels.

In the first instance, such matters will be addressed by the appropriate IT administrators. Whenever it becomes necessary to enforce University rules or policies, an authorized IT administrator may prohibit network connections by certain computers (even departmental and personal ones); require adequate identification of computers and users on the network; undertake audits of software or information on shared systems where policy violations are suspected; take steps to secure compromised computers that are connected to the network; or deny access to computers, the network, and institutional software and databases. Users are expected to cooperate with investigations either of technical problems or of possible unauthorized or irresponsible use as defined in these guidelines; failure to do so may be grounds for suspension or termination of access privileges. 

If the infringement is not settled in discussion with the computing administrator, a matter involving students will be referred to the appropriate dean of students; a matter involving faculty will be referred to the department chair or dean; and a matter involving staff will be referred to the immediate supervisor, the manager of the unit, or an official in Human Resources. In addition, certain kinds of abuse may entail civil or criminal action as well.

 
Millikin University - Decatur, IL
 
Millikin University - Decatur, IL
Guest