ISU Policies and Procedures ISU Home | A to Z Listing of Web Sites | Search
Home | Table of Content | A-Z Index | Search Handbook

Part 3. Services, Functions and Facilities Use

Section VIII. Information Technology (5-05)

A. Policy Definitions

Policies governing the use of information technology systems at ISU may incorporate some or all of the following definitions.

1. Authorized Users: Include but are not limited to faculty, staff, students, contractors, and guests that are in good standing with ISU and have a valid account for accessing ISU's IT system.

2. Confidentiality: The state where information can be viewed only by entities that have been authorized to view it. Such authorization may or may not come from the owner or individual.

3. Crack, crackable (as in passwords): a program for discovering passwords that works by taking strings of characters and encrypting them, then comparing the encrypted text against a file of encrypted passwords. If the two strings of encrypted characters are the same, then the string of characters is a valid password. The program tries the most likely combinations first (login names, full names, addresses, etc) then moves on to a huge "dictionary" containing words from all languages, place names, people names, names of characters in books, jargon, slang, and acronyms.

4. Due Process: The implementation of policy that follows procedures and practices established and approved by ISU, including notice and an opportunity to be heard prior to suspension or removal of user privileges where reasonably practicable, and where not reasonably practicable, or in the event of an emergency, as soon thereafter as may be reasonable under the circumstances.

5. Information Technology Administrator (ITA): the person or office charged with ensuring proper administration and maintenance of ISU's information technology system. The ITA will be appointed by the Office of the President. The ITA position may be filled by, but is not limited to, the Chief Information Officer, the Chief Information Security Officer, Information Technology Services (formerly Computing and Communications) and/or other entities designated by the Office of the President.

6. ISU's IT system: may include but is not limited to information systems, networking and telecommunications systems, data processing hardware and software, data transmission equipment and transmission medium, and data storage devices.

7. Privacy: the expectation that activities and information stored on a network will not be known by any other individual or entity on the network without authorization or permission of the owner.

8. SPAM: Unsolicited "junk" e-mail sent to large numbers of people to promote products or services. Sexually explicit unsolicited e-mail is called "porn spam." Also refers to inappropriate promotional or commercial postings to discussion groups or bulletin boards.

9. System Administrator: an individual, designated by the appropriate dean or director, who is charged with the administration of local systems that are attached to ISU's IT system. The ITA is notified of such appointments.


[ Table of Contents ] [ Back to Part 3 ]