IU

Indiana University Southeast Indiana University Southeast IU Southeast

Menu Search

IU Policies & Procedures

As one of eight Indiana University campuses, the IU Southeast Information Technology office subscribes to central IU policies regarding the use of technology. Policies cover appropriate use of IU technology resources, servers, fair usage, mass e-mail, non-academic use, and more. Those policies can be found on the University Information Policy Office website.

For your convenience, here are several commonly-referenced items:

Protecting Red-Hot Data: Safe Handling of Critical Information

IU’s Information Policy Office maintains a publication entitled “Protecting Red-Hot Data: A Guide to Safe Handling of Critical Information.” It is important to protect critical information and the provisions associated with the handling of such data.

The above-referenced publication defines critical information as data that requires special care and handling, especially when inappropriate handling of the information could result in:

  • Criminal or civil penalties
  • Identity theft or personal financial loss
  • Invasion of privacy, and/or
  • Unauthorized access to this type of information by an individual or many individuals

Critical information is considered “red-hot” data requiring the very highest level of protection. The following types of data are classified as “red-hot:”

  • Social security numbers
  • Credit card numbers
  • Debit card numbers
  • Bank account or other financial account numbers
  • Driver’s license numbers
  • State ID card numbers
  • Student loan information
  • Protected health information or individually identifiable health information relating to past, present, or future conditions, provisions of health care, and payment for the provisions of health care
  • Foundation donor data
  • Passwords, pass phrases, PIN numbers, security codes, and access codes

The University has very strict policies and procedures regarding the collection, storage, and transmission of “red-hot” data. The collection of such data requires approval, notification, and consent. After these conditions have been met, “red-hot” data in electronic format can only be stored on a secure file server. It cannot be stored on a desktop workstation, laptop, PDA, USB drive, flash drive, or any mobile/media device unless (a) the information is properly encrypted on the device and (b) you have received proper prior written approval confirming a critical business need to do so. You must use an approved encryption method when electronically transmitting “red-hot” data.

Paper records containing “red-hot” data must be kept in locked file cabinets/storage rooms or otherwise access controlled.

If you or your office handles critical information, please take time to review “Protecting Red-Hot Data: A Guide to Safe Handling of Critical Information”.

You may also contact the IT Support Center at (812) 941-2447 or helpdesk@ius.edu if you have any questions or need guidance regarding the collection, storage, or transmission of critical information. 

IU Mobile Device Security Standard

Follow IU’s mobile device security standard, otherwise known as IT Policy 12.1. In summary, the policy states that all IU employees (faculty, staff, affiliates and student-workers) who use a mobile device, regardless of who owns the device, to access, store or manipulate institutional data, including accessing their IU email, must meet the following requirements on the mobile device:

  • Require a minimum 4-character passcode using at least two unique characters;
  • Require your device to auto lock after a maximum of 15 minutes of inactivity;
  • Require your device to lockout or wipe after 10 incorrect access attempts.

Mobile devices should never be used to access, store, or manipulate critical information.

Employees must notify it-incident@iu.edu if the device is lost, stolen or otherwise compromised. Additionally, the device must be wiped (i.e., factory reset) to ensure all data has been erased before transferring ownership (sales, trade-in, etc.).

You can view IT policy 12.1 in its entirety here

You can get more information on IU’s classification levels of institutional data here.  

If you have any questions, or would like assistance with device configuration, please contact the IT Support Center at (812) 941-2447 or helpdesk@ius.edu.

What To Do in the Event of Suspected Data Compromise, Loss, or Exposure

As you are already aware the university prohibits storing sensitive or confidential data on your electronic devices, as such laptop/notebook computers, personal digital assistants, smart phones, tablets, and other computing and communications devices. This includes information such as SSN’s, Driver’s License numbers, and Credit/Debit card information. You can find a more complete list here

However, if you ever find yourself in a situation where one of your electronic devices has been lost, stolen, infected with a virus, or otherwise compromised—meaning accessed or inadvertently shared with unauthorized individuals—please take the following actions:

  1. DON’T PANIC
  2. If the suspected data compromise, loss, or exposure was on a computer, then stop working/using the computer
    • DO NOT power it off. This action might delete evidence that may be critical to the incident.
  3. IMMEDIATELY CALL, no matter what time of day or night or weekday or weekend or holiday, until you get to a human. Try in this order: 
    1. Administrative Offices of UITS at 941-2287 (M-F)
    2. Contact Support Center at 941-2447 (24x7)
    3. Southeast Operator and ask to speak with someone in UITS at 812-941-2000 (24x7)
  4. Provide the following:
    • A description of the data that was suspected compromised, lost, or exposed
    • The type of physical device that the data was accessed from (jump drive, computer etc.)
    • Details such as what, where, when and how the suspected compromised, loss, or exposure of data occurred.
  5. We also recommend that you update your supervisor on the circumstances.
  6. Please do not discuss the incident with anyone until authorized to do so by the appropriate IU officials, which in most cases is the University Information Policy Office.

See Protecting Red-Hot Data for additional direction on the safe handling of Critical Information.

Curious if you have accidently stored critical data on your computer? Scan your computer now with Identity Finder.

Identity Finder is a tool to help prevent identity theft. It can search for, protect, and dispose of personal information stored on your computer, file shares, or external media. This information includes credit card numbers, bank account numbers, Social Security numbers, birthdates, passwords, driver's license numbers, addresses, passports, employee identification numbers, maiden names, or other data you determine.

How do I use Identity Finder? 

NOTE: We will perform regular scans of our servers.

Please feel free to contact the IT Support Center at (812) 941-2447 or helpdesk@ius.edu with any questions you may have.

IU Southeast Specific Policies & Procedures

Here are IU Southeast specific policies:

What to do with Lost, Unusable or Unwanted USB Flash Drives

To protect our campus community from the risk of personal and institutional data theft, IU policy requires that we all follow these steps regarding USB flash drives:

  • Any drive found around campus should be turned in to the University Police office, where it will be kept for 30 days to give the owner a chance to reclaim. After 30 days, the drive will be taken to IT and destroyed.
  • Dead, broken or unwanted USB flash drives should be taken to the UITS Help Desk in US 212, where they will be destroyed. Do not simply throw them into the trash.

Instead of USB flash drives, IU recommends using Box cloud storage. Box provides 100GB of no-cost storage space to every IU student, faculty or staff member, that is accessible from any web-enabled device. It is secure and, best of all, you can’t accidentally leave it behind!

To learn more about Box at IU, see this Knowledge Base article

If you have questions about a USB flash drive please contact the Support Center at 941-2447 or helpdesk@ius.edu.

Inventory Procedures Governing Computer Equipment Assets

IU Southeast has strict procedures for tracking computer assets, which include desktop computers, laptops and tablets.. 

  1. All computer equipment moves must be performed by the UITS staff so that the records associated with this equipment inventory remain accurate. Requests for moves may be submitted via phone (941-2447), email (helpdesk@ius.edu) or web form (IT Support Request).
  2. Accounting Services at IU Southeast will no longer approve orders to purchase computer equipment without the approval and signoff of the UITS team. UITS will ensure that all future computer equipment orders are in compliance with the requirements spelled out in university policy. UITS can order the equipment on your behalf, inventory the equipment, and set it up. For more information on the policies, please see policies 12, 12.1 and 28 at the University Policy Office webpage.
Employee Cell Phone Policy

An Indiana University policy approved by the Board of Trustees (fiscal policy I–480), effective July 1st 2005, requires employees who have a university-provided cell phone, in many cases, to acquire personal cell phone service and arrange for university reimbursement. The new procedure will allow employees to select their cell phone carrier of choice.

IU Southeast will reimburse employees for one cell phone and an average amount of monthly service fees. Telephone Services will determine the average monthly service charge each year. Employees who carry a cell phone for university business will receive additional pay in this amount each month.

The following are excluded from this policy:

  • Departmental Phones: A departmental phone is a shared phone that does not leave the campus and is turned in by each employee at the end of his/her shift. Departmental phones are not impacted by this policy.
  • Two-Way Radio Phones: This includes communication devices where phone service is not enabled and only two-way radio function, or push-to-talk capabilities, are enabled.
Procedure

The process to acquire reimbursement for cell phone service is as follow:

  1. Employee must complete a request for cell phone reimbursement form and route it to their department head. The Director of Accounting services will be copied on the request.
  2. Human Resources contacts employee to have condition contract signed. Route sheet and contract are filed in Human Resources.
  3. Employee obtains personal contract with vendor of choice and brings Department Head a copy of the receipt for hardware and service agreement.
  4. Department Head notifies Human Resources of total hardware amount and service agreement. Notification must include exact amount.
  5. Reimbursement is set up via E-Doc in the payroll system by Human Resources.

Before reimbursement is set up, employee must agree with all below conditions of reimbursement and sign condition contract.

Terms and Conditions
  1. For 2005 – 2006, the base reimbursement rate for cell phone service will be $39.99 per month, and base reimbursement rate for a Blackberry device will be $64.99 per month. Reimbursement will be grossed up to counter income tax effects. These amounts are reviewed annually.
  2. Base rates are for a standard cell phone and Blackberry services. Any additional features will be at the expense of employee unless the employee’s department head determines that a business need exists.
  3. In case of termination of employment for any reason, department will pay deactivation fee for cell phone contract if employee cancels plan within 30 days of termination of employment.
  4. Employee is required to acquire insurance for any assets related to plan. A base insurance rate of $5.99 will be reimbursed.
  5. If employee goes over allotted minutes of plan, reimbursement will be available if itemized bill is submitted and audited by department head.
  6. Upgrades of any assets related to phone will not be reimbursable to employee unless department head determines that a business need exists.
  7. Any damage to plan assets is not reimbursable unless department head determines extraordinary situation exists.

Complaints concerning violations of this or other administrative policies should be sent to webadmaf@ius.edu or webit@ius.edu.

Email as an Official Means of Communication

IU Southeast is pleased to announce that, effective July 1, 2004, electronic mail (email) will become an official means of communication with IUS students. This campus policy is in accordance with the Indiana University Policy on Use of Email as Official Correspondence with Students adopted on December 10, 2003. Students will benefit by receiving timely, accurate, and up-to-date communication about matters including, but not limited to:

  • financial aid and scholarships
  • registration
  • billing notification
  • university policy statements
  • university services and events
  • course information
  • degree completion and/or graduation
  • administrative actions
  • academic calendar

To set up your email account, visit the Account Management website and follow the instructions on the screen. If you encounter any problems please visit the IT Help Desk in University Center 212, stop by the staffed Student Technology Centers in Crestview 112 or Knobview 207, or call the Helpdesk at 941-2447.

A student’s failure to receive or read official university communications sent to the student’s official email address does not absolve the student from knowing and complying with the content of the official communication.

The university provides a simple mechanism for students to forward email from the official university email address to another email address of the student’s choice at the Account Management website. Students who choose to have their IU Southeast email forwarded to another email address do so at their own risk. The University is not responsible for any difficulties that may occur in the proper or timely transmission of, or access to, email forwarded to an unofficial email address, and any such problems will not absolve a student of their responsibility to know and comply with the content of official email communications sent to the student’s official IU email address.

View the full text of the IU Policy on Use of Email as Official Correspondence with Students »

Students should check their university email accounts frequently.

Student Technology Fee Guidelines

Visit the Guidelines for Student Technology Fees (STF) page »

Campus News

News Item Image

IU Southeast advisor receives award from NACADA

Read more »
The 2015 IU Southeast Commencement – Monday, May 11

The 2015 IU Southeast Commencement – Monday, May 11

Read more »
IU Southeast presents Mid-Year Economic Update

IU Southeast presents Mid-Year Economic Update

Read more »
The Horizon’s look at homelessness featured in News and Tribune

The Horizon’s look at homelessness featured in News and Tribune

Read more »
IU Southeast volunteers complete 2015 Campus Beautification Day

IU Southeast volunteers complete 2015 Campus Beautification Day

Read more »
News Item

IU Southeast journalism students receive awards at ICPA convention

Read more »
News Item Image

IU Southeast professor receives John W. Ryan Award

Read more »
News Item Image

APICS vice president of strategy to speak at IU Southeast

Read more »
News Item Image

Chancellor’s Medallion Dinner raises record-breaking funds for student scholarships

Read more »
News Item Image

“New Albany: City by the River” screening to occur April 16

Read more »
News Item

IU voices concerns over state’s Religious Freedom Restoration Act, reaffirms commitment to equality

Read more »
News Item

IU Southeast Activities Building to Close Temporarily for Construction

Read more »
News Item Image

New Vice Chancellor of Advancement to assume duties Feb. 2

Read more »
News Item

IU Southeast announces 2015 Commencement plans

Read more »
News Item Image

“Apprentice” winner Bill Rancic to speak at IU Southeast

Read more »
News Item Image

Holocaust survivor Eva Moses Kor to speak at IU Southeast Feb. 10

Read more »
See all news ยป

Campus Events

The Van-Dells image

The Van-Dells

May 29th, 2015

7:30 PM - 10:00 PM

Majors Expo image

Majors Expo

June 1st, 2015

12:20 PM - 1:30 PM

Majors Expo image

Majors Expo

June 2nd, 2015

12:20 PM - 1:30 PM

Majors Expo image

Majors Expo

June 2nd, 2015

4:05 PM - 5:30 PM

Graduate Business Open House image

Graduate Business Open House

June 24th, 2015

6:00 PM - 7:30 PM

See all events »