ITC MEETING

FRIDAY, JANUARY 7, 2000

 

Present: Layton Cottrill, Sarah Denman,  Jan I. Fox, Tom Hankins, Jim Hooper, Karen McComas, Robert Rowe, Gary Weis

 

The following copies were handed out:  Agenda, Minutes of last meeting, E-mail Policy, IT Strategic Planning Report, and Copyright Policy.

 

The minutes were approved after the following corrections.  Change under first bullet MILO manufacturer to manufactures.  Under changes for E-mail Policy renumber 1 through 10; under EPOC Committee take the word sorta out; under New Business change the word set to sit.

 

Fox:  Updates:

 

 The Yahoo Internet Survey is an annual survey that lists the most wired universities.  Each time they have done it, we have requested a copy of the survey, but never received it.   This is the first year we will be part of that pool.  We have technology across the spectrum not just in some areas.  The survey is due in February and will come out sometime in March.

 

Statewide Community College IT Group.  I have been working for one and a half years with the Statewide IT Curriculum for Community Colleges. We need to integrate WebCT and get faculty trained.  We want to standardize the IT curriculum.

 

Grant:  This week I submitted a grant pre-proposal o the National Science Foundation. This would integrate the One Room School design to Gifu Prefector Japan.

 

Membership:  Herb Tesser is the new faculty representation.  He is on sabbatical this semester.  He and Tom Hankins are going to trade in and out.  Also we have added Robert Rowe to this committee.

 

E-Course Policy: The E-Course Policy that cleared this committee last spring has not gone on to faculty senate.  I have made a request for this.

 

 

E-Mail Policy: Changes to E-mail Policy.

 

1.            Renumber the items under “Purpose”, adding an item (10) Authorization Procedure and (11) General Information and Definitions.

 

2.         Rewrite the Chain Letter section under (4) E-mail Violations as follows:

 

Old:

 

        Chain Letters/Junk Email - It is a violation of University policy to send chain letters and junk email.  A chain letter is a letter sent originally through national and international mail services and now through networks such as the Internet. The original intent was for young people, mostly students, to meet peers of the world.  Writers shared such things as their community environment, their schools, their friends, and many times about their family life.  Junk email is email sent as commercial transactions, personal business, and other non-university activities.   The negative side to chain letters and junk email on the Internet, or any other network, is that it fills the net and the mail servers with useless junk at the expense of the subscribers that uses the Internet mail legitimately.

 

New:

           

        Chain Letters - It is a violation of University policy to send chain letters.  A chain letter is a letter sent originally through national or international mail services, and now through networks such as the Internet, that require that copies of the message be forwarded to others. The original intent was for young people, mostly students, to meet peers of the world.  The negative side to chain letters on the Internet, or any other network, is that it fills the net and the mail servers with useless junk at the expense of the subscribers using the Internet mail legitimately.

 

3.         Under “Unauthorized Mass Mailings under (4) E-mail Violations:

 

Change: "Mass Mailings" are excessive, unauthorized, and frivolous mailings   To: "Mass Mailings" are excessive, unauthorized, or frivolous mailings

 

4.         Add Item 10 for Authorization Procedure as follows:

 

(10) Authorization Procedure:

Any questions on the authorization procedure may be directed to the CIO or their designate.

 

5.                  Renumber (10) General Information and Definitions to (11) General Information and Definitions

 

Fox: IT Strategic Planning Report: As a group we need to look at this report.  The committee worked incredibly hard on this document.  It is still very much a draft and we are still making corrections.  Need this group to look over the document and give suggestions or make corrections.   Important component on Page 5 deals with finances.  We need to define with a full project description on Page 5 under Campus-wide Information Technology Project Summary and be more detailed. 

 

Under weakness we need to look at tenure and promotion procedures.  Need to be revamped to include the use of technology or technical innovation.  This has been one of the most limiting aspects for faculty involvement.   

 

Sarah said this has already been done.  Has been mandated under Bill 547, which relates to the curriculum in developing courses and the use of technology.  The Senate will have to approve it, and if they do, it will become the new evaluation for faculty starting the fall 2000.  This will become a part of their record and can be used for promotion and merit decisions.

 

Layton made a motion that Jan write a letter of support on behalf of the committee encouraging and indorsing the concept for credit in promotion and tenure on information technology.  It was seconded and the motion passed.

 

 

Taylor:  Telecommuting Policy.  Allen gave a power point presentation on Telecommuting Policy Strategy.  Telecommuting is a work arrangement in which some or all of an employee’s work is performed at an off-campus work site, such as the home, a hotel, non-university office commercial site, customer home/office, etc.  The target date should be for policy completion this semester with policy compliance required by July 1, 2000.  He will put up on the web page with supporting documents.

 

Fox:  It is absolutely imperative that our policy take a pro action stance.

 

Next meeting will be Friday, February 4, 2000 in Drinko Conference Room 426 from 9:30 to 11:00 AM

 

 

Itc1_99