IT Department Policies

Acceptable Use Policies

Use of Campus Network and other IT infrastructures

  • For MIU Teaching and Academic Endeavors
  • For MIU Administrative Activities
  • For Limited Personal Use that does not negatively affect others’ use, or cause significant extra support or cost.

Prohibited Use of Campus Network and other IT infrastructure:

  • Illegal use — prohibited
  • Private Business use — prohibited
  • Extensive Personal use negatively affecting the use of others — prohibited
  • Pornography and Gambling sites — prohibited and filtered


  • The Campus Network and its infrastructure is a resource shared by all on campus.
  • Over the last few years, there has been an exponential growth in the use of bandwidth per person.
  • Growth in Movie-Video Streaming, Video Phone, Downloads of Large Files, and On-line Gaming have all contributed to this.
  • The University cannot practically provide large enough Internet bandwidth for everyone to do everything at all times.
  • The University does provide bandwidth that is typical of Universities with its size student population and number of campus residents.
  • For the benefit of all, one must carefully use and share this precious resource so all can do the most valuable functions requiring Internet Access

Computer and Network Usage Policies

The use of Maharishi International University IT resources and campus network is primarily for university Academic, Research, and Administrative activities. All other uses are secondary.

Users of the network and computer resources have a responsibility to properly use and protect those information resources and to respect the rights of others. This policy provides guidelines for the appropriate use of information technologies.

  1. Applicability — This policy is applicable to all University students, faculty and staff and to others granted use of MIU information resources. This policy refers to all University information resources whether individually controlled or shared, stand-alone or networked. It applies to all computer and communication facilities owned, leased, operated, or contracted by the University. This includes networking devices, personal digital assistants, telephones, wireless devices, personal computers, workstations, mainframes, minicomputers, and any associated peripherals and software, regardless of whether used for administration, research, teaching or other purposes.
  2. Department Policies — Departments may create their own supplemental conditions of use if consistent with this policy.
  3. Legal and University Process — The University does not exist in isolation from other communities and jurisdictions and their laws. Under some circumstances, as a result of investigations, subpoena, or lawsuits, the University may be required by law to provide electronic or other records or other information related to those records or relating to use of information resources (“information records”). Further, the University may in its reasonable discretion review information records, e.g., for the proper functioning of the University or for internal investigations.

2. Policies

  1. Copyrights and Licenses — Computer users must respect copyrights and licenses to software, entertainment materials, published and unpublished documents, and any other legally protected digital information.
  2. Copying — Any material protected by copyright must not be copied except as specifically stipulated by the owner of the copyright or otherwise permitted by copyright law. Protected material may not be copied into, from, or by any University facility or system, except pursuant to a valid license or as otherwise permitted by copyright law.
  3. Number of Simultaneous Users — The number and distribution of copies of copyrighted materials must be handled in such a way that the number of simultaneous users in a department does not exceed the number of original copies purchased by that department, unless otherwise stipulated in the purchase contract or as otherwise permitted by copyright law.
  4. Copyrights — All copyrighted information (text, images, icons, programs, video, audio, etc.) retrieved from computer or network resources must be used in conformance with applicable copyright and other law. Copied material must be properly attributed. Plagiarism of digital information is subject to the same sanctions as apply to plagiarism in any other media.
  1. Integrity of Information Resources — Computer users must respect the integrity of computer-based information resources.
    1. Modification or Removal of Equipment — Computer users must not attempt to modify or remove computer equipment, software, or peripherals that are owned by others, without proper authorization.
    2. Encroaching on Others’ Access and Use — Computer users must not encroach on others’ access and use of the University’s computers, networks, or other information resources, including digital information. This includes but is not limited to: attempting to access or modify personal, individual or any other University information for which the user is not authorized; attempting to access or modify information systems or other information resources for which the individual is not authorized; sending chain-letters, unsolicited bulk electronic mail either locally or off-campus; printing excess copies of documents, files, data, or programs; running grossly inefficient programs when efficient alternatives are known by the user to be available; unauthorized modification of system facilities, operating systems, or disk partitions; attempting to crash or tie up a University computer, network or other information resource; or otherwise damaging or vandalizing University computing facilities, equipment, software, computer files or other information resources.
    3. Unauthorized or Destructive Programs — Computer users must not intentionally develop or use programs which disrupt other computer or network users or which access private or restricted information or portions of a system and/or damage software or hardware components of a system. Computer users must ensure that they do not use programs or utilities which interfere with other computer users or which modify normally protected or restricted portions of the system or user accounts. Computer users must not use network links for any use other than permitted in network guidelines. The use of any unauthorized or destructive program may result in legal civil action for damages or other punitive action by any injured party, including the University, as well as criminal action.
  2. Unauthorized Access — Computer users must refrain from seeking to gain unauthorized access to information resources or enabling unauthorized access.
    1. Abuse of Computing Privileges — Users of University information resources must not access computers, computer software, computer data or information, or networks without proper authorization, or intentionally enable others to do so, regardless of whether the computer, software, data, information, or network in question is owned by the University. For example, abuse of the networks to which the University belongs or the computers at other sites connected to those networks will be treated as an abuse of University computing privileges.
    2. Reporting Problems — Any defects discovered in system accounting or system security must be reported to the appropriate system administrator so that steps can be taken to investigate and resolve the problem.
    3. Password Protection — A computer user who has been authorized to use a password-, or otherwise protected, account may be subject to both civil and criminal liability if the user discloses the password or otherwise makes the account available to others without permission of the system administrator.
  3. Usage — Computer users must respect the rights of other computer users. Most University systems provide mechanisms for the protection of private information from examination by others. Attempts to circumvent these mechanisms in order to gain unauthorized access to the system or to another person’s information are a violation of University policy and may violate applicable law. Authorized system administrators may access computer users’ files at any time for maintenance purposes. System administrators will report suspected unlawful or improper activities to the proper authorities.
    1. Prohibited Use — Use of the University’s computers, network or electronic communication facilities (such as electronic mail or instant messaging, or systems with similar functions) to send, view or download fraudulent, harassing, obscene (i.e., pornographic), threatening, or other messages or material that are a violation of applicable law or University policy, such as under circumstances that might contribute to the creation of a hostile academic or work environment, is prohibited at any time.
    2. Mailing Lists — Users must respect the purpose and charters of computer mailing lists (including local or network news groups and bulletin-boards). The user of an electronic mailing list is responsible for determining the purpose of the list before sending messages to or receiving messages from the list. Subscribers to an electronic mailing list will be viewed as having solicited any material delivered by the list as long as that material is consistent with the list’s purpose. Persons sending to a mailing list any materials which are not consistent with the list’s purpose will be viewed as having sent unsolicited material.
    3. Advertisements — In general, the University’s electronic communication facilities should not be used to transmit commercial or personal advertisements, solicitations or promotions (see Commercial Use, below). Public bulletin boards that have been designated for selling items by members of the MUM community may be used appropriately, according to the stated purpose of the list(s).
    4. Information Belonging to Others — Users must not intentionally seek or provide information on, obtain copies of, or modify data files, programs, passwords or other digital materials belonging to other users, without the specific permission of those other users.
  4. Political, Personal and Commercial Use — The University is a non-profit, tax-exempt organization and, as such, is subject to specific federal, state and local laws regarding sources of income, political activities, use of property and similar matters. It also is a contractor with government and other entities and thus must assure proper use of property under its control and allocation of overhead and similar costs.
    1. Political Use — University information resources must not be used for partisan political activities where prohibited by federal, state or other applicable laws, and may be used for other political activities only when in compliance with federal, state and other laws and in compliance with applicable University policies.
    2. Personal Use — University information resources should not be used for personal activities not related to appropriate University functions during business hours, except in a purely incidental manner.
    3. Commercial Use — University information resources should not be used for commercial purposes during business hours, except in a purely incidental manner or except as permitted under other written policies of the University or with the written approval of a University officer having the authority to give such approval. Any such commercial use should be properly related to University activities, take into account proper cost allocations for government and other overhead determinations and provide for appropriate reimbursement to the University for taxes and other costs the University may incur by reason of the commercial use. Users also are reminded that the “EDU” domain on the Internet has rules restricting or prohibiting commercial use, and thus activities not appropriately within the EDU domain and which otherwise are permissible within the University computing resources should use one or more other domains, as appropriate.
  5. Inspection and Monitoring — Any two of the following: the University’s Executive Vice President, Chief Administrative Officer, or Legal Counsel can authorize the inspection of private data or monitoring of messages (including electronic mail) when there is reasonable cause to suspect improper use of computer or network resources. Legally privileged material should not be reviewed without consent of the owner.

3. Consequences Of Misuse Of Computing Privileges

A user of University information resources who is found to have purposely or recklessly violated any of these policies will be subject to disciplinary action up to and including discharge, dismissal, expulsion, and/or legal action.

  1. Cooperation Expected — Users, when requested, are expected to cooperate with system administrators in any investigation of system abuse. Users are encouraged to report suspected abuse, especially any damage to or problems with their files. Failure to cooperate may be grounds for cancellation of access privileges, or other disciplinary actions.
  2. Corrective Action — If system administrators have persuasive evidence of misuse of computing resources, and if that evidence points to the computing activities or the computer files of an individual, they should pursue one or more of the following steps, as appropriate to protect other users, networks and the computer system.
    • Provide notification of the investigation to the University’s Chief Administrative Officer as well as the user’s instructor or department head.
    • Temporarily suspend or restrict the user’s computing privileges during the investigation. A student may appeal such a suspension or restriction and petition for reinstatement of computing privileges through the Dean of Students. A staff member may appeal through applicable dispute resolution procedures. Faculty members may appeal through the Dean of Faculty.
    • With authorization from the University’s Chief Administrative Officer, inspect the user’s files, disks, tapes, and/or other computer-accessible storage media on University owned and operated equipment.
    • Refer the matter for possible disciplinary action to the appropriate University unit, i.e., the Dean of Students Office for students, the Chief Administrative Officer for staff, and the Dean of Faculty for faculty.

Wi-Fi Policy

Wireless Policy Principles

In light of the facts that:

  • Many students want the convenience of wifi at additional places on campus,
  • Wireless-only devices are becoming more popular, however,
  • Many people prefer not to have any more EMF added to their environment – especially in places such as living quarters, program halls, and working spaces, and
  • There is no completely EMF free environment – unless one makes an extraordinary effort to create it, and
  • Further research is needed on the health effects of wifi exposure,
  • The University policy on wifi is an attempt to satisfy as many of these perspectives as possible in a practical manner keeping in mind the principle that less EMF is better than more.

General Policy on Wireless

  • Certain areas on campus are designated as wifi-free – including but not limited to the domes, TM Sidhi program halls, and other areas. Neither the University nor a student may establish wireless in these areas.
  • In certain other areas, the University will establish and support wireless with its own devices. Individuals may not establish wireless in these areas. Over time these areas will expand to meet the demand as University resources permit.
  • Areas not in either of the above may have wireless set up by individuals. The owner of the Wireless Router must be responsible for configuring it properly. Otherwise, its network access will be disabled – to prevent disruption of service to others.
  • A Wifi Committee will determine the specific areas described above. It consists of the Chief Administrative Officer, the Dean of Faculty, the Dean of Student Life, and the IT Director.
  • The IT department is responsible for setting up and maintaining the university supported wireless, and administering these policies.

Wireless / Wireless-Free Areas:


  • Men’s and Ladies’ domes
  • Other TM Sidhi Program Halls
  • 5 Vastu Residence Halls
  • Annapurna Dining Commons


  • Library — Public area
  • High Rise Buildings: 140 – 144
  • Hildenbrand Hall
  • Argiro Student Lounge
  • Building 152 and 106
  • Certain Classrooms as requested by faculty
  • Art Center
  • Verrill Hall — Physiology Department


These areas can have wireless at the discretion and agreement of those living in the area. If agreement cannot be reached, the University will support and enforce the NO Wifi policy in those areas, as a precautionary measure.

It should be noted that wired connections can be installed in almost every campus building and room, and there are adapters for some wifi-only devices that enable them to connect through a wired connection.

E-Waste Policy

Electronic Waste Policy

  • The IT Dept DOES NOT accept recycling electronics. Users are directed to take to local recycling center at:  Connelly Recycling 903 West Gear Road (Next to golf range) Phone: 641-469-3188

IT Remote Access Policy

Our aim is to service your request as quickly as possible. Please follow instructions and provide all information requested otherwise it will delay the process.

• All remote access requests must come through the helpdesk ticket system (no exceptions).

• All requests must come from the department head or have department head approval (email)

• Each request must have a list of all the people needing remote access. The following contact information will be needed:
o Name
o Reason for request?
o Email address
o Phone numbers (both on & off campus)
o Residence – on/off campus?
o What apps do you need access to? (please list all apps that are needed to perform your job)
o What kind of connection do you have where you reside? DSL, fiber, satellite, cable
o List your Internet Service Provider (e.g. Lisco, Mediacom, Windstream, etc.)

• Turnaround – 3 days depends upon number of people being requested, the access needed (i.e. VPN, server(s), etc.) and number of requests currently in the queue.
o Compro requests may take longer – due to additional setup for firewall, servers, etc.

• Must demonstrate and maintain security protocols for FERPA, HIPPA and any other confidential information.