In place |
2020 |
Reviewed/ Revised |
2024 |
Reviewed/ Revised by |
IQAC (04 May 2024) |
Approved by |
Academic Council (26 Oct 2024) |
Notification |
Registrar |
Notification No & Date |
27-10-2024 |
Next schedule review |
2027 |
Preamble:
The Integral University Information Technology (IT) Policy describes the part of central policies that governs the accountable usage of all users of the University’s IT related resources. This includes the IT facilities owed centrally or by individual departments. It is expected from every member of the university to be acquainted with and stick to this policy. Users of Integral University computing, networking and IT facilities are expected to abide by the set rules, which are intended to preserve the utility and flexibility of the system, protect the privacy and work of students and faculty and other staff, and preserve our right to access the international networks to which the system is connected. In case of complaints, appropriate action to be taken will be decided and taken by the person in-charge of the facility in consultation with the authorities as appropriate.
Applicability:
The IT Policy applies to all University faculty, staff, and students with authorized accounts and all others using the IT resources, whether personally or of University owned which access transmits or stores various types of related information.
1.Objectives
Each user of the IT resources must ensure that it is utilized for achieving the mission of the University towards teaching, learning, research, and administration. Some of the major points related to objective are:
- Make the University more accessible to the present and prospective stakeholders and empowering them through enhanced access to information and quality services while improving governance through the use of IT infrastructure.
- Develop international linkages with a view to facilitate participation in national, regional and international networks strengthening teaching, learning and research in the University.
- Promote and strengthen new IT infrastructure and IT services across the University by providing assistance in setting up quality IT infrastructure.
- Create world class IT infrastructure for seamlessly connecting and integrating all IT Service Providers and End Users.
- To ensure the integrity, reliability, availability, and superior performance of the University IT Systems.
- To ensure that the IT resources and copyright material of the University is protected
- To ensure that all the users of the University are accountable for following the procedures for the implementation of this Policy document.
- To make budgetory provisions to expand ever growing digital systems and services including update of IT facilities such as high speed LAN and Wi-Fi facility.
- To identify the IT related requirements for various academic and administrative departments in the campus and recommend the purchase department to make them available the IT related facilities as per budgetary provisions.
2. Areas:
2.1 IT usage and Prohibitions
To the extent possible, users are expected to use only their official email addresses provided by Integral University for official communications with other members of the University. Any complaints/requests must be made using your authorized email id otherwise we will not be able to verify your identity. In case for some reason you are not able to access your IU email then you may write to us (ithd@iul.ac.in) from your registered alternate mail id with us.
2.1.1 The users of the University shall make effective usage of campus collaboration systems, internet, wireless resources, official website Academic monitoring system, Student management system, Employee management system, Integral Learning Initiative and e-Library resources.
2.1.1 The University shall stress upon the users to comply with University policies, IT act of the Government of India and legal obligations (including licenses and contracts).
2.1.2 The University shall attempt to arrange for awareness programmes to explain the users with the effective usage of IT resources.
2.1.3 Prohibited Use - The users shall not send, view or download fraudulent, harassing, obscene, threatening, or other messages or material that are a violation of applicable law or University policy. In particular, contributing to the creation of a hostile academic or work environment is prohibited.
2.1.4 Copyrights and Licenses - Users must not violate copyright law and must respect licenses to copyrighted materials. For the avoidance of doubt, unlawful file‐sharing using the University’s information resources is a violation of this policy.
2.1.5 Social Media - Users must abide by the rules of the University towards the usage of social networking sites, mailing lists, news rooms, chat rooms and blogs.
2.1.6 Commercial Use - The University IT resources shall not be used for any commercial and promotional purposes, through advertisements, solicitations or any other message passing medium, except as permitted under University rules.
2.1.7 NO FOOD OR DRINK is permitted in the Departmental laboratories. Smoking is strictly prohibited. Also making noise either through games/ music or even talking and/ or singing loudly is prohibited.
2.2 Security and Integrity
2.2.1 Personal Use - The University IT resources should not be used for activities violating the basic functionality and mission of the University, except in a purely incidental manner.
2.2.2 The users must refrain from making any unauthorized access of information in order to promote secure access of Network and Computers.
2.2.3 The competent system administrator may access the information resources for a legitimate purpose.
2.2.4 Firewall - Additional procedures to maintain a secured flow of internet and intranet based traffic in the campus shall be managed through the use of Unified Threat Management (firewall).
2.2.5 Anti-virus and security updates - The regular updation of the anti-virus policy and security updates should be done for the protection of computing resources.
2.3 IT Asset Management
2.3.1 Asset Management: The University has business processes for the management of hardware and software assets that facilitates the usage of IT resources in the University. This includes procedures for managing the purchase, deployment, maintenance, utilization, energy audit, and disposal of software and hardware applications within the University. The purchase of new items is dealt by purchase department on the recommendation of the concerned department. The maintenance of IT facility is handled by IT Help Desk (ITHD). The development and maintenance of website and other application softwares are taken care by software Development Cell (SDC).
2.3.2 Copying and Distribution: The University will ensure that there is no violation in the copying and distribution of proprietary and licensed softwares.
2.3.3 Risks: The University shall emphasize on managing the risks involved for the usage of IT resources. This shall include standard procedures for identification, minimization and monitoring of risk impact by preventive and corrective measures. This should also include procedures for timely data backup, replication and restoring policies, power backups, audit policies, alternate internet connectivity for a fail-safe internet access.
2.3.4 Open Source Asset: The University shall attempt towards the promotion and effective usage of open source softwares.
3. Operating Aspects:
3.1 University Governance - The University shall try to ensure fair implementation of this policy so as to meet with the objectives of its formation. The responsibility of the management of operational aspects of IT resources is as per the hierarchical flow of the University governance structure.
3.2 The respective Heads of the departments shall be responsible for compliance with all University policies relating to the use/ownership of information resources, keeping in mind the Vision and Mission of the University.
3.3 Individual Users - It is the users' responsibility to protect their account from unauthorized use by changing passwords periodically and using passwords that are not easily guessed. Sharing of passwords for any purpose whatsoever is strictly prohibited. The users are solely responsible for the activities they perform on University servers with their "UserName/Password" pairs assigned to them.
3.4 To the extent possible, users are expected to connect only to the official IU WiFi network for wireless access. Setting up of unsecured WiFi systems on the IU network is prohibited.
4. Violation of Policy:
Any violation of the basic objectives and areas mentioned under the IT Policy of the University shall be considered as a violation and as a misconduct and gross misconduct under University Rules.
Acknowledgement:
Integral University wishes to acknowledge the following institutions/universities whose related policies and procedure provided background and foundation in the preparation of this policy document:
IIT Delhi, IIT Bombay, Princeton University, Yale University, University of Michigan, Thapar University, Nirma University.