Classroom Polling: Terms

and Conditions

Copyright and Academic Integrity

If you are considering using i>clicker for academic purposes the following information will be helpful in understanding the law and policy around the protection of students’ education records as well as copyright for both you as the faculty member and for the students.

Faculty own the copyright of original content within i>clicker (for example, screen prints of PowerPoint slides) according to Cornell University Copyright Policy, unless other contracts or agreements have been arranged specifically between the faculty member and the university.

Moreover, both faculty and students are advised to use i>clicker resources responsibly by observing all laws and university policy that are incorporated into the Codes of Conduct and Academic Integrity. Some specific aspects of law and policy that might be well to remember are prohibitions against copyright infringement, plagiarism, harassment or interference with the underlying technical code of software. For more information visit the CIT site on Digital Literacy, http://digitalliteracy.cornell.edu/.

Family Education Rights Protection Act (FERPA)

Faculty should be aware that the content students enter using i>clicker constitutes an education record and that FERPA regulations apply. Those regulations require that the content be protected from disclosure without student consent. Disclosure in this context includes posting student content openly on the Internet (for example, student responses to i>clicker questions.)

Policies

Users of Cornell University’s IT resources are subject to local, state, and federal laws, as well as University IT policies. See Responsible Use of Electronic Communications for what this means for you.

Violations of policy may be prosecuted under the Campus Code of Conduct or the Code of Academic Integrity. The network is a Cornell University resource and Cornell IT may restrict any person’s access to its resources without prior notice.

Security

Users of the Cornell network are responsible for the security of their computer and other networkable devices. See Securing Your Computer from the IT Security Office.

The IT Security Office may monitor campus networks for systems showing signs of infection or compromise. Systems displaying serious vulnerabilities or problematic behavior may have their network access restricted or denied until the issue has been resolved.

Device Registration

University Policy 5.7 Network Registry requires that any computer or other networkable device connected to the Cornell network (wired or Wi-Fi) must be registered.

Billing (Students Only)

Student Internet (wired and Wi-Fi) use at Cornell is subject to network usage-based billing (NUBB). Students who exceed the monthly billing threshold will be billed. Campus visitors, faculty, staff, and other non-students are not subject to billing.

Data Collection by Cornell

Cornell IT collects data about network usage for security, performance, troubleshooting, and billing. Data collection is in compliance with University Policy 5.1 Responsible Use of IT Resources.

Print Friendly, PDF & Email

Support

For immediate support:

acadtech@cornell.edu

607 255 9760 (M-F, 9a - 5p ET)

Search Academic Technologies