Privacy

The staff at Management Information is firmly committed to protecting the privacy of the faculty, staff, and students at the University of Illinois. Our web site is designed to provide information to university staff members and aid them in doing university business. The information contained in the site is not intended to be used for personal gain or for non-university business, so the use of the web site is monitored. We believe that access to this site is a privilege, not a right, and we reserve the right to terminate access to anyone who misuses the web site.

Confidential data

Some of the data on this site is considered confidential by the university. Access to these sites is controlled and only users who require access to this information for their job are granted access. Users are expected to respect the confidentiality of the data they are granted access to. Violation of this confidentiality will result in removal of access to all the DMI sites.

Cookies

A cookie is a file created on your computer when you enter our web site. You may configure your browser to refuse cookies, but you will not be able to access any of our secure sites if you do so. We use cookies on our secure sites (those requiring a login) in order to save the user logon, what the user is authorized to see, and the choices made by the user from previous pages at our site. We need to use cookies in order to pass this information from one page to the next. Our cookies are not active once you leave our web site and do not pass any information to us other than the information you have entered yourself into the DMI web pages. We do not use cookies to store information from one session to the next, so you may delete the cookies at the end of your session with us.

Logs

Security logs: We maintain security logs of all log in events at our web site. We use these to monitor repeated password violations and other events that might indicate someone is trying to break into our server. If we see that a login was used repeatedly with an incorrect password, we may contact the user, the user's supervisor, or the network administrator or security contact of the user's IP address to find out what is causing the problem.

Access logs: We also track all requests for web pages and maintain logs of these requests with the time, user id, IP address, and type of operating system and browser. The logs are used to provide statistics and feedback to us on how people are using our services in order for us to improve our web offerings. If we suspect that our data are being misused for personal gain or non-university business, we may use the logs to verify who accessed what data and when.