The policy of the North Dakota State University Information Technology Division is to respect the privacy of all users of information technology services. This electronic privacy statement is intended to inform the The Division of IT clients of our information gathering and usage practices.
North Dakota University System Policy and Procedure, 1901.2, NDSU Policies and Procedures 158 and 710, federal and state laws, and the NDSU Information Technology Services Confidential Information Agreement take precedence over this privacy statement.
Use of Information:
Electronic records needed to support The Division of IT functions are retained, managed, and accessible in accordance with established records disposition authorizations to the extent permitted or authorized by law. Electronic records will be identified, managed, protected, and retained as long as they are needed to meet administrative, fiscal, or legal requirements.
Information security is an area of major concern in higher education; without it, an institution's private data and intellectual property could be compromised.
NDSU must continually reassess the threats and risks to private data, confidential information, and intellectual property, creating a secure electronic information environment on campus. Information safeguarding requires participation from everyone in the campus community and leadership at all levels, especially in the areas of policies, procedures, governance, and infrastructure. Information security, in today's world, is everyone's responsibility, just as it is to work safely in the workplace. Individual privacy rights and open access to information must be protected as much as legally and practically possible.
Electronic records stored and received by The Division of IT are subject to the access and confidentiality provisions of state and federal law. ITS provides security and privacy for information stored and received on its systems and services. In addition, the following information provided to us is protected from disclosure to the public: personal, copyright, research, trademark, and proprietary information; unless otherwise specified by the owner. Information not specifically addressed in this document may be disclosed pursuant to the North Dakota Open Records Law.
North Dakota law specifies in NDCC Ch.44-04-18 that "Except as otherwise specifically provided by law, all records of a public entity are public records, open and accessible for inspection during reasonable office hours." All information provided to, stored, or collected electronically that is not specifically exempted by state or federal law should be considered as an "open record" and may be released upon any request of the public.
Network Traffic Logs:
In the course of ensuring network security and consistent services for all clients, we employ software programs to do such things as monitor network traffic, identify unauthorized access to nonpublic information, enforce access rights and user quotas, detect computer vulnerabilities, and other software that might damage university computers. In the course of such monitoring, the information detected from these activities is used only for monitoring for compliance with law and policy and for the purpose of maintaining the security and performance of NDSU's networks and computer systems. Personally identifiable information from these activities is not released to any party without consent unless required or authorized by law.
In the course of ensuring network security and consistent services, it may be necessary to audit NDSU owned desktops regarding:
- Operating system installation and maintenance.
- Hardware installation, repairs, and upgrades.
- Software licensing, application installation and configuration.
In the course of such an audit, personal, copyrighted, research, trademarked or proprietary data on the client's machine will not be purposely or intentionally reviewed unless there is valid and/or legal reason to do so.
The Desktop Support Team may install and maintain an application that will enable efficient and remote management and maintenance of the user's desktop. The application may also be used for the followi
- Remotely turn computers on and off.
- Automatically update antivirus definitions.
- Edit the system registry.
- Automatically update the computers operating system.
- Inventory hardware and software.
- Install and remove software applications automatically.
At no time will personal, copyrighted, trademarked, proprietary, or research data on the client's machine be reviewed unless there is valid and/or legal reason to do so.
The Division of IT servers routinely collect and store information from online visitors to facilitate management and improve service of those server and services. This information may include Web pages visited, the date and time of the visit, the Internet address (URL or IP address) of the referring site, the domain name and IP address from which the access occurred, the version of browser used, the capabilities of the browser, and search terms used on the search engines. We make no attempt to identify individual visitors from this information; no personally identifiable information is released to external parties without consent unless required or authorized by law.
Collection of Information:
The Division of IT uses the collected information to respond appropriately to requests. Survey information collected may be used statistically to help us understand usage patterns and forecast requirements.
Information Voluntarily Provided by Clients:
In the course of using the NDSU Web site, the you may choose to provide us with information to help us serve you. Personally identifiable information will only be used for the purpose indicated. Requests for information will be directed to the appropriate staff, and may be recorded to help us update services to better serve your requests. We will not sell, exchange or otherwise distribute personally identifiable information without prior authorization except to the extent required or authorized by law. We also will not retain the information longer than necessary for normal operations. The purpose for all information will be disclosed through the appropriate media form.
Jul 28, 2015
1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.
Feb 17, 2015
Over-sharing on a first date could lead to no second date, but over-sharing on a social media site could lead to data theft, real property theft, or physical danger to yourself or your family. There are lots of automated scripts already running on the Internet looking for keywords that are posted to social media, these scripts do everything from changing the word "meet" to "meat" and posting the results to twitter, to alerting potential thieves that a family is now on vacation and away from their house. Be safe on social media
Feb 6, 2015
New Slim Spray Diet ... Want a Cruise ... Fight Hair Loss Now ... SPAM SPAM SPAM ... It seems to get into every e-mail inbox beofre the account is even setup. But there are some ways to fight this menace.
- Don't reply to it
- Don't tell vendors your e-mail account
- If your service has the option, report it or mark it as spam
There are more ways to fight in the link below.
FEB 4, 2015
Its Tax Refund Season, Time for a new phone or tablet. But what about the old one? Do you have information on that device that could be used against you? How can you make sure that your old phones and devices don't come back to haunt you when you are done with it? Many people buy old equipment off ebay just to see what kind of data is left on those devices. Follow this guide to make sure that your device is wiped clean before you dispose of it.
FEB 3, 2015
When you download an app on social media or your mobile device, you may be allowing it to collect personal information like your contacts list or location. If possible, look at an app’s permissions before downloading and make sure you are comfortable with the information it collects. If the app does not tell you what information it collects, error on the side of caution and assume that it may be collecting information.
FEB 2, 2015
There is a security and privacy threat almost everywhere you go. Most don't even think about it. Free WIFI, if its free how can that be bad? In fact most Free WIFI could be quite safe, but a few access points could have an active sniffer on the line watching every single nibble of data that goes across its interface, looking for passwords, usernames, or e-mail addresses. Click Below for more information on safely using WIFI when traveling.