Information Technology Council 2005-2006

Minutes, Meeting of Monday, October 3, 2005

Members Attending: Deborah Trytten, Robert Kelly, Cheryl Carney, Sarah Robbins, Matt Matos, Jamie Skibsted, Teri Murphy, Dimitrios Papavasilliou, Hunter Crowther-Heyck, Don Maletz. Guests: Loretta Early.

Absent: Matt Deeg, Nick Hathaway, Burr Milsap, Mike Sewell, Dennis Aebersold.

Minutes of the August 29, 2005, meeting were approved, on a motion by Deborah, seconded by Teri.

1. Announcements, organizational:

Review of the schedule of meetings this semester led to an agreement to change the proposed Wednesday, November 2 meeting to Monday, November 7, at 3:30 pm. The last meeting of the semester is set for Monday, December 2.

2. Old business:

The bulk of this meeting was devoted to reporting on criticisms of the proposed Network policy voiced by members of the Faculty Senate Executive Committee and by Robert Murphy, who proposed numerous revisions at a recent meeting of the Staff Senate.

Don Maletz and Deborah Trytten met with the former group prior to the ITC meeting. Key points on which clarification was sought included: justifying the need for replacement of an older policy dating back to 1996; the status of sub-networks, such as the one maintained by the College of Business; the relative merits of centralized control of technology vs. a “federalism” model (advocated by Bob Dauffenbach, Business), with division of responsibility and authority between the ‘federal, state, and local’ levels; and the breadth of language concerning obligations to policies, procedures, and laws. Issues raised in Robert Murphy’s critique were also discussed with the Executive Committee, all of whose members had received the Murphy statement.

The revised ITC proposal for a Network Policy is attached below (with a few editorial corrections made after the ITC meeting). Main new points in this version: reorganization and clarification of the document’s structure; acknowledgement of a right of university organizations to maintain sub-networks, provided they conform to IT and University policies; specification of the source for the official IT policies.

A draft of the revised document will be proofed and corrected by ITC members and provided to the Faculty Senate by Wednesday, October 5. The Faculty Senate will discuss the revised version at a meeting on Monday, October 12. ITC will take into consideration further comments from both the Faculty Senate and the Staff Senate and plan to have a final version of the Network Policy for approval at the November meeting of the Faculty and Staff Senates.

3. New business:

Deborah has assembled a detailed guide to the method for obtaining insertion of language into the Faculty and Staff handbooks, and into the Student Code, that would refer readers to the official University Policies on information technology. These policies would be collected on a new ITC web page in a suitable format. Robert Kelly agreed to design an appropriate page. The ITC objective is to secure approval to revise the policies’ titles, removing the “interim” designation, and to have the appropriate language inserted into the handbooks and code, by the conclusion of the spring semester, 2006.

In the time remaining, there was a discussion of the day’s agenda item that had to be put off to the next meeting, namely the review of two new documents from IT, a Guide to Core Services and a Guide to Enhanced Services.

Meeting adjourned at 5:04 pm.
Don Maletz

Revised ITC proposal for an OU Network Policy (October 4, 2005)
University of Oklahoma
Network Policy

The University’s computer systems and networks are shared resources used by many individuals to carry out the University’s mission of teaching, research, and service.  Use of these resources must be ethical, accord with principles of academic honesty and academic freedom, respect the rights of other users, demonstrate respect for intellectual property and ownership of data, respect system security mechanisms, and promote an environment free from intimidation and harassment.

By using University computer systems and networks, users agree to abide by approved University information technology policies* and to comply with applicable state and federal laws. This policy outlines services and responsibilities of individual users, academic and administrative units, and Information Technology (IT). 

I. CONTROL, RESPONSIBILITY, AND ACCOUNTABILITY: IT has responsibility for maintaining the reliability, accessibility, and security of the network.  

A. The network should be accessible to all authorized users for the utilization of standard services.

B. University organizations have a right to maintain locally-administered networks that connect to the University network, provided they conform to University network policies. IT will work with LAN administrators to support this policy.

C. IT has responsibility to approve the design, deployment, and management of campus wireless networks. A network-wide approach must be taken to minimize interference, secure the wireless networks, and ensure the integrity of the campus computing systems connected to these networks

D. IT will maintain a support structure for resolving user concerns.

E. Users have the responsibility to observe University policy and are accountable for their actions. No user shall willfully violate any university, state or federal rules governing the operation of the network or the dissemination of information through it.

II. RELIABILITY AND PERFORMANCE: Network performance should be highly reliable to support the work of the University, subject to administrative, physical and fiscal constraints. IT will work with the internet service provider to maintain network performance up to professional standards.

III. SECURITY: IT has the responsibility to protect the network from access by unauthorized persons or groups.

IV. ACCESSIBILITY: All members of the University community must have appropriate access to the University network and services, without regard to disability, physical location, or platform, within administrative, physical, and fiscal constraints. The content of materials accessed via the network by legitimate users shall not be abridged or censored, except as required by law.

*For approved University policies, see