Content | Navigation |

NDSU Privacy Statement
The policy of the North Dakota State University Information Technology Division is to respect the privacy of all users of information technology services. This electronic privacy statement is intended to inform the The Division of IT clients of our information gathering and usage practices.

North Dakota University System Policy and Procedure, 1901.2, NDSU Policies and Procedures 158 and 710, federal and state laws, and the NDSU Information Technology Services Confidential Information Agreement take precedence over this privacy statement.

Use of Information: 

Electronic records needed to support The Division of IT functions are retained, managed, and accessible in accordance with established records disposition authorizations to the extent permitted or authorized by law. Electronic records will be identified, managed, protected, and retained as long as they are needed to meet administrative, fiscal, or legal requirements.

Information Safeguarding:

Information security is an area of major concern in higher education; without it, an institution's private data and intellectual property could be compromised. 

NDSU must continually reassess the threats and risks to private data, confidential information, and intellectual property, creating a secure electronic information environment on campus. Information safeguarding requires participation from everyone in the campus community and leadership at all levels, especially in the areas of policies, procedures, governance, and infrastructure. Information security, in today's world, is everyone's responsibility, just as it is to work safely in the workplace. Individual privacy rights and open access to information must be protected as much as legally and practically possible. 

Public Disclosure:

Electronic records stored and received by The Division of IT are subject to the access and confidentiality provisions of state and federal law. ITS provides security and privacy for information stored and received on its systems and services. In addition, the following information provided to us is protected from disclosure to the public: personal, copyright, research, trademark, and proprietary information; unless otherwise specified by the owner. Information not specifically addressed in this document may be disclosed pursuant to the North Dakota Open Records Law.

North Dakota law specifies in NDCC Ch.44-04-18 that "Except as otherwise specifically provided by law, all records of a public entity are public records, open and accessible for inspection during reasonable office hours." All information provided to, stored, or collected electronically that is not specifically exempted by state or federal law should be considered as an "open record" and may be released upon any request of the public.

Network Traffic Logs:

In the course of ensuring network security and consistent services for all clients, we employ software programs to do such things as monitor network traffic, identify unauthorized access to nonpublic information, enforce access rights and user quotas, detect computer vulnerabilities, and other software that might damage university computers. In the course of such monitoring, the information detected from these activities is used only for monitoring for compliance with law and policy and for the purpose of maintaining the security and performance of NDSU's networks and computer systems. Personally identifiable information from these activities is not released to any party without consent unless required or authorized by law.

Desktop Services:

In the course of ensuring network security and consistent services, it may be necessary to audit NDSU owned desktops regarding:

  • Operating system installation and maintenance.
  • Hardware installation, repairs, and upgrades.
  • Software licensing, application installation and configuration. 

In the course of such an audit, personal, copyrighted, research, trademarked or proprietary data on the client's machine will not be purposely or intentionally reviewed unless there is valid and/or legal reason to do so.

Remote Desktop:

The Desktop Support Team may install and maintain an application that will enable efficient and remote management and maintenance of the user's desktop. The application may also be used for the followi

  • Remotely turn computers on and off.
  • Automatically update antivirus definitions.
  • Edit the system registry.
  • Automatically update the computers operating system.
  • Inventory hardware and software.
  • Install and remove software applications automatically. 

At no time will personal, copyrighted, trademarked, proprietary, or research data on the client's machine be reviewed unless there is valid and/or legal reason to do so.

Server Logs:

The Division of IT servers routinely collect and store information from online visitors to facilitate management and improve service of those server and services. This information may include Web pages visited, the date and time of the visit, the Internet address (URL or IP address) of the referring site, the domain name and IP address from which the access occurred, the version of browser used, the capabilities of the browser, and search terms used on the search engines. We make no attempt to identify individual visitors from this information; no personally identifiable information is released to external parties without consent unless required or authorized by law.

Cookies:

Cookies are pieces of information stored by the Web browser on behalf of a Web site and returned to the Web site on request. The NDSU Web site(s) may use cookies for two purposes: to carry data about the current session at the site from one Web page to the next, and/or to identify to the site between visits. The cookie setting may be turned off in the computer's browser, or the browser may be set to send a request to the client prompting the client to accept the new cookie. Some pages may not function properly if the cookies are turned off. Unless otherwise notified on the NDSU Web site, The Division of IT will not store data, other than for these two purposes, in cookies. Cookies remain on the computer. ITS does not store cookies or forward them to any external parties. Unless otherwise noted on the Web site, NDSU does not use cookies to track movement among different Web sites and does not exchange cookies with other entities.

NDSU provides links to other World Wide Web sites or resources. NDSU does not control these sites and sources, does not endorse them, and is not responsible for the availability, content, or delivery of services. In particular, external sites are not bound by NDSU's electronic privacy policy.

Collection of Information:

The Division of IT uses the collected information to respond appropriately to requests. Survey information collected may be used statistically to help us understand usage patterns and forecast requirements.

Information Voluntarily Provided by Clients:

In the course of using the NDSU Web site, the you may choose to provide us with information to help us serve you. Personally identifiable information will only be used for the purpose indicated. Requests for information will be directed to the appropriate staff, and may be recorded to help us update services to better serve your requests. We will not sell, exchange or otherwise distribute personally identifiable information without prior authorization except to the extent required or authorized by law. We also will not retain the information longer than necessary for normal operations. The purpose for all information will be disclosed through the appropriate media form. 

NDSU IT Security Updates

Jul 28, 2015

1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.

http://arstechnica.com/security/2015/07/fiat-chrysler-recalls-1-4-million-cars-over-remote-hack-vulnerability/

Feb 17, 2015

Over-sharing on a first date could lead to no second date, but over-sharing on a social media site could lead to data theft, real property theft, or physical danger to yourself or your family. There are lots of automated scripts already running on the Internet looking for keywords that are posted to social media,  these scripts do everything from changing the word "meet" to "meat" and posting the results to twitter, to alerting potential thieves that a family is now on vacation and away from their house. Be safe on social media

https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social#general-tips

Feb 6, 2015

New Slim Spray Diet ... Want a Cruise ... Fight Hair Loss Now ... SPAM SPAM SPAM ... It seems to get into every e-mail inbox beofre the account is even setup.  But there are some ways to fight this menace.

  • Don't reply to it
  • Don't tell vendors your e-mail account
  • If your service has the option, report it or mark it as spam

There are more ways to fight in the link below.

http://www.hongkiat.com/blog/5-simple-steps-to-fight-spam/

FEB 4, 2015

Its Tax Refund Season, Time for a new phone or tablet. But what about the old one? Do you have information on that device that could be used against you?  How can you make sure that your old phones and devices don't come back to haunt you when you are done with it?  Many people buy old equipment off ebay just to see what kind of data is left on those devices.  Follow this guide to make sure that your device is wiped clean before you dispose of it.

http://www.cnet.com/how-to/how-to-wipe-your-phone-or-tablet-before-selling/

FEB 3, 2015

When you download an app on social media or your mobile device, you may be allowing it to collect personal information like your contacts list or location. If possible, look at an app’s permissions before downloading and make sure you are comfortable with the information it collects. If the app does not tell you what information it collects, error on the side of caution and assume that it may be collecting information.

http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/20/what-those-creepy-sounding-app-permissions-mean-and-when-to-be-wary/

 

FEB 2, 2015

There is a security and privacy threat almost everywhere you go.  Most don't even think about it.  Free WIFI, if its free how can that be bad? In fact most Free WIFI could be quite safe, but a few access points could have an active sniffer on the line watching every single nibble of data that goes across its interface, looking for passwords, usernames, or e-mail addresses.  Click Below for more information on safely using WIFI when traveling.

http://www.privatewifi.com/wireless-safety-tips-for-travelers/


Student Focused. Land Grant. Research University.

Follow NDSU
  • Facebook
  • Twitter
  • RSS
  • Google Maps

North Dakota State University
IT Help Desk Phone: +1 (701) 231-8685
Administrative Calls Only: +1 (701) 231-7961 / Fax: (701) 231-8541
Campus address: Quentin Burdick Building 206
Physical/delivery address: 1320 Albrecht Blvd, Fargo, ND 58102
Mailing address: NDSU Dept. 4510 / PO Box 6050 / Fargo, ND 58108-6050
Page manager: Information Technology Services

Last Updated: Thursday, January 12, 2012