Computing Policies

Nebraska and College of Business Computing Use Policies

University of Nebraska-Lincoln faculty, staff and students are expected to use all computing resources responsibly and are expected to adhere to guidelines and policies as set forth by the university and laws and regulations of federal, state and local government.

CoB computing policy for CoB faculty staff and students includes UNL computing policy as found at the UNL Computer Use Policies webpage as well as the following:

CoB computing policies include those policies defined by UNL for use of computing resources, including Executive Memorandum No. 16.

Permitted Uses

University business use and limited personal use.
Prior approval is required for personal use for outside consulting, business or employment.

Access

Unauthorized access is prohibited.
No one should use the ID or password of another.
When any user terminates his or her position with the University, their ID and password shall be denied further access to University computing resources.

Misuse of Computers and Network Systems

Misuse of University information systems is prohibited, and includes the following:

Attempting to modify or remove computer equipment, software, or peripherals without proper authorization
Accessing without proper authorization computers, software, information or networks to which the University belongs
Circumventing logon or other security measures
Using information systems for any illegal or unauthorized purpose
Personal use of information systems or electronic communications for non-University consulting, business or employment, except as expressly authorized
Violating any software license or copyright, including copying or redistributing copyrighted software, without the written authorization of the software owner Accessing other users' information or files without permission. Academic dishonesty
Forging, fraudulently altering, falsifying, or otherwise misusing University or non-University records
Using electronic communications to steal another individual's works, or otherwise misrepresent one's own work
Using electronic communications to fabricate research data
Downloading, transporting or posting illegal, proprietary or damaging material to a University computer
Personal use of any University information system to access, download, print, store, forward, transmit or distribute obscene material
Store social security numbers, credit card numbers, or other account information without proper authorization

Privacy

User privacy is not guaranteed
IT personnel have authority to access individual user files or data in the process of performing maintenance
With reasonable cause, IT personnel may access account, file, or other data controlled by an alleged violator and share that data with persons authorized to investigate misuse of computing resources

Email

All policies stated are applicable to email
E-mail should reflect careful, professional and courteous drafting style

College Specific Policies

Service requests should be submitted to the Technical Solutions Center, preferably via the electronic form at the Service Request webpage.
Emergency information technology issues should be brought to the attention of CoB ITS at (402) 472-5215, cbaits@unl.edu, the Service Request webpage or via walk-in our Technical Solutions Center in CoB 235E as soon as possible.

Application and Enforcement

A failure to abide by the guidelines outlined in this document may result in the imposition of one or more of the following sanctions:
denial of access to information resources and networks, disciplinary action by UNL, civil action and/or criminal prosecution.

Informing CoB ITS About New Users

To gain access to IT resources, CoB ITS needs to process new user information for new users. CoB ITS asks that we are informed of incoming new users in writing through your HR representative or at http://business.unl.edu/it-services/forms/new-user/. Two weeks notice is best to minimize the possibility of delayed access to IT resources by the new user.

Procedure

A CBA faculty/staff member may request IT equipment or accounts for new users, such as new full time faculty/staff hires, student workers, and graduate students. The form may be found at http://business.unl.edu/people/itservices/webforms/NewUser/ and it is required for access to UNL IT for new users.

New User Process

Full time faculty/staff user:

  1. New hire needs to be input in SAP (via the ePAF form) as soon as they are hired
  2. When they hit SAP, they should have an NUID generated for them by the NU registry
  3. Once that happens, they will be picked up by IDM and an account generated 48-72 hours after the employees start date (if using an EPAF)
  4. Their account will be generated in LDAP, preloaded in to Blackboard, etc as soon as it has been created in IDM
  5. Email notification will go out to the user, to whatever address is on file in SAP
  6. Without an email address, the user may still go to https://id.unl.edu/claim to claim their new account
  7. They will need their NUID, birthdate, and the exact spelling of their name to match their record in SAP
  8. When they claim their account, they will set their own password and answers to their security questions
  9. The user's email, blackboard, and computer accounts now exist, but the CBA IT Help Center must now modify the accounts to operate with CBA systems (network drives, security policies, etc)

Graduate students and student workers:

  • These new users are set up much faster, as CoB ITS has a greater amount of control over the process
  • A computer must be prepared (1-2 weeks after new user request submission)
  • The computer account must be created and modified to allow access to CoB network resources such as network drives (48-72 hours after request submission)
  • And email account can be created for the new user (1-4 weeks)The new hire's email account must be set of on his/her new computer (24-48 hours after email account creation)
  • The user's email address must be added to CoB address book(s) (48-72 hours after email account creation
  • N Card building access may be granted for the new user (24 - 48 hours after request submission if N card number is included)

Estimated turnaround time for new users

Full time faculty/staff:

New Computer: 1-2 weeks after request submission
Computer account: 48-72 hours after employee start date in SAP
Email account: 48-72 hours after employee start date in SAP
N card access: 24-48 hours after request submission

Graduate students and student workers:

New Computer: 1-2 weeks after request submission
Computer account: 1-2 days after request submission
Email account: 1-4 weeks after request submission
N card access: 24-48 hours after request submission

Levels of Support and Repair

To accommodate varying needs in instruction, research and administration technology, while avoiding excessive variability in equipment, technology purchases shall conform to College Technology Standards. Standardization provides the College community a high level of productivity in a cost effective manner as well as other benefits, including reduction of complexity, improved operational efficiency, robust communication, and/or assurance of continued availability of service and consistent technical support.

Standards

To accommodate varying needs in instruction, research and administration technology, while avoiding excessive variability in equipment, technology purchases shall conform to College Technology Standards. Standardization provides the College community a high level of productivity in a cost effective manner as well as other benefits, including reduction of complexity, improved operational efficiency, robust communication, and/or assurance of continued availability of service and consistent technical support.

Levels of Support

Standard Support

Standard support hardware includes technology products that are widely used at CoB and purchased through CoB ITS and:

are models identified from a UNL Prime Vendor
meet the operating system software requirements as specified by the hardware manufacturer,
meet the system requirements necessary to function within the university network environment, and are designed for institutional or business use (i.e., not marketed for home use). Full computers also need to meet additional hardware standard requirements identified by CBA ITS including driver avaliability
warranty needs
replacement part supplies
upgrade part supplies
knowledge base on frequent problems and solutions
other requirements
For these products, CoB IT Services has the skills, expertise and resources available to provide in depth assistance.

Limited Support

Limited support hardware products are ones that are less widely used at CoB than the standard support hardware. These models meet all of the requirements for Standard Support, however, they are not the specific models identified.

Limited support is provided for these hardware items provided that they were purchased with university funds and are currently under warranty. For these products, CBA IT Services provides basic troubleshooting assistance and warranty assistance. However, for complex issues and replacement parts, departmental resources may be required.

Areas Not Supported

Items not meeting the stated requirements for Standard or Limited Support are not supported by CoB ITS.

Personal Computers on the Network

Internet addresses are provided dynamically through a Dynamic Host Configuration Protocol (DHCP) system. In order to obtain a static Internet (TCP/IP) computer address the owner of the system must register the computer with IT Services.

The rules and regulations contained in this policy pertaining to electronic mail and Internet access are equally applicable to the use of personal machines for file sharing or as servers. ITS reserves the rights to disconnect any network port whose activity causes an adverse effect on the network or on any other user. Network connections may also be revoked in the case of malicious or inappropriate computing activity on the network. ITS reserves the rights to disconnect any network port whose activity causes an adverse effect on the network or on any other user. Network connections may also be revoked in the case of malicious or inappropriate computing activity on the network.

Checkout Equipment Policy

Checkout equipment including laptops, cameras, projectors, and other equipment for faculty and staff can be reserved at http://business.unl.edu/it-services/forms/equipment-reservation-request/ and picked up in the Technical Solutions Center in CoB 235E. Items are generally available for a max of 14 days, and departments may be charged for past due to damaged equipment.

  1. Only faculty or permanent staff may request checkout equipment.
  2. All equipment is loaned for a maximum of 14 days (For special exceptions, see 3). The requestor must return the equipment at the end of the reservation period. If no one has reserved the equipment, the requestor may be able to check out the equipment for another 14 day period.
  3. Special exceptions may be made to the 14 day policy for circumstances such as conferences or foreign travel. If a requestor desires an exception, they may submit a service request at http://business.unl.edu/it-services/forms/equipment-reservation-request and include what type of equipment is desired, and why an exception should be made.
  4. The requestor must pick up the equipment from the Technical Solutions Center in CoB 235E.
  5. The requestor must return the equipment to the Technical Solutions Center in CoB 235E.
  6. The department of the requestor will be held responsible for any repair or replacement of the equipment should it be lost or damaged.
  7. If a permanent employee or faculty member checks out equipment for student use, their department will be responsible for repair or replacement should the equipment be damaged or lost.
  8. No equipment is for sale.
  9. No equipment is available for permanent checkout.
  10. No equipment is available for semester checkout.
  11. As resources are limited, the Technical Solutions Center cannot guarantee availability of checkout equipment.

Past Due Equipment

All checkout computers are equipped with security software that will disable the computer if it falls past due.

A memo will be sent to the requester reminding them to return the equipment when it falls one day past due. If an item falls three days past due, a second memo will be sent to the requestor that the department will be billed for the equipment if it is still not returned and a copy of the memo will be sent to the department head. If the equipment falls seven days past due, the requestor's department will be charged for the replacement of the equipment.