The policy of the North Dakota State University Information Technology Division is to respect the privacy of all users of information technology services. This electronic privacy statement is intended to inform the The Division of IT clients of our information gathering and usage practices.
North Dakota University System Policy and Procedure, 1901.2, NDSU Policies and Procedures 158 and 710, federal and state laws, and the NDSU Information Technology Services Confidential Information Agreement take precedence over this privacy statement.
Use of Information:
Electronic records needed to support The Division of IT functions are retained, managed, and accessible in accordance with established records disposition authorizations to the extent permitted or authorized by law. Electronic records will be identified, managed, protected, and retained as long as they are needed to meet administrative, fiscal, or legal requirements.
Information security is an area of major concern in higher education; without it, an institution's private data and intellectual property could be compromised.
NDSU must continually reassess the threats and risks to private data, confidential information, and intellectual property, creating a secure electronic information environment on campus. Information safeguarding requires participation from everyone in the campus community and leadership at all levels, especially in the areas of policies, procedures, governance, and infrastructure. Information security, in today's world, is everyone's responsibility, just as it is to work safely in the workplace. Individual privacy rights and open access to information must be protected as much as legally and practically possible.
Electronic records stored and received by The Division of IT are subject to the access and confidentiality provisions of state and federal law. ITS provides security and privacy for information stored and received on its systems and services. In addition, the following information provided to us is protected from disclosure to the public: personal, copyright, research, trademark, and proprietary information; unless otherwise specified by the owner. Information not specifically addressed in this document may be disclosed pursuant to the North Dakota Open Records Law.
North Dakota law specifies in NDCC Ch.44-04-18 that "Except as otherwise specifically provided by law, all records of a public entity are public records, open and accessible for inspection during reasonable office hours." All information provided to, stored, or collected electronically that is not specifically exempted by state or federal law should be considered as an "open record" and may be released upon any request of the public.
Network Traffic Logs:
In the course of ensuring network security and consistent services for all clients, we employ software programs to do such things as monitor network traffic, identify unauthorized access to nonpublic information, enforce access rights and user quotas, detect computer vulnerabilities, and other software that might damage university computers. In the course of such monitoring, the information detected from these activities is used only for monitoring for compliance with law and policy and for the purpose of maintaining the security and performance of NDSU's networks and computer systems. Personally identifiable information from these activities is not released to any party without consent unless required or authorized by law.
In the course of ensuring network security and consistent services, it may be necessary to audit NDSU owned desktops regarding:
- Operating system installation and maintenance.
- Hardware installation, repairs, and upgrades.
- Software licensing, application installation and configuration.
In the course of such an audit, personal, copyrighted, research, trademarked or proprietary data on the client's machine will not be purposely or intentionally reviewed unless there is valid and/or legal reason to do so.
The Desktop Support Team may install and maintain an application that will enable efficient and remote management and maintenance of the user's desktop. The application may also be used for the followi
- Remotely turn computers on and off.
- Automatically update antivirus definitions.
- Edit the system registry.
- Automatically update the computers operating system.
- Inventory hardware and software.
- Install and remove software applications automatically.
At no time will personal, copyrighted, trademarked, proprietary, or research data on the client's machine be reviewed unless there is valid and/or legal reason to do so.
The Division of IT servers routinely collect and store information from online visitors to facilitate management and improve service of those server and services. This information may include Web pages visited, the date and time of the visit, the Internet address (URL or IP address) of the referring site, the domain name and IP address from which the access occurred, the version of browser used, the capabilities of the browser, and search terms used on the search engines. We make no attempt to identify individual visitors from this information; no personally identifiable information is released to external parties without consent unless required or authorized by law.
Collection of Information:
The Division of IT uses the collected information to respond appropriately to requests. Survey information collected may be used statistically to help us understand usage patterns and forecast requirements.
Information Voluntarily Provided by Clients:
In the course of using the NDSU Web site, the you may choose to provide us with information to help us serve you. Personally identifiable information will only be used for the purpose indicated. Requests for information will be directed to the appropriate staff, and may be recorded to help us update services to better serve your requests. We will not sell, exchange or otherwise distribute personally identifiable information without prior authorization except to the extent required or authorized by law. We also will not retain the information longer than necessary for normal operations. The purpose for all information will be disclosed through the appropriate media form.
Feb 4, 2016
Security Vendor Malwarebytes called out for highly insecure products.
A Google security researcher called out Malwarebytes for failure to secure their servers, including some privilege escalation flaws, and not using any encryption techniques for downloading updates to its popular anti-malware software. Malwarebytes is stating that it could three to four weeks to fix the flaws found.
Aug 4, 2015
Free Windows 10 Upgrade, yes indeed Windows 10 is a free upgrade for a year for computers with Windows 7 and 8 installed on them. However, Microsoft will not tell you about this in an e-mail. Ransomware (software that will encrypt your files and then ask for money for the decryption key) has been seen being delivered through an e-mail promising a free windows 10 upgrade. Delete these messages as you get them and do not open any attachment that you did not expect to receive.
Jul 28, 2015
1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.