Table of Contents for Policies
Print-friendly Version of Table of Contents
|First appointment year||No less than 3-months notice|
|Second appointment year||No less than 6-months notice|
|Third and subsequent appointment years||No less than 1-year notice|
The University Purchasing Directors of Southern
Illinois University are authorized to rent from
others, as necessity warrants, properties that
in their opinion will help to satisfy the requirements
of the administrative, educational, and auxiliary
operations of the University. The University
Purchasing Directors may negotiate lease contracts
in which the University is the lessee subject
to approval by the President prior to final
execution of the document. The University Purchasing
Directors may negotiate leases of University
properties to others and give notice to vacate
subject to approval by the President. (3/13/03,
Prior approval by the Board of Trustees is required before the commitment of funds can be made for requisitions for fixed improvements projects or annual needs by subdivision of work for renovation, repair, and maintenance activities where the entire project cost or annual need by subdivision of work is $500,000 or more. The Board of Trustees shall approve the project, the budget, and major changes to the budget, defined as changes of 10 percent. The Board shall receive the bids and award all contracts. (12/08/11)
Prior approval by the Board of Trustees is not required if the fixed
improvement project involving a commitment of less
than $500,000, provided that the President's approval
is obtained for projects of $100,000 or more.
(9/14/00, 2/12/09, 12/08/11)
The Board authorizes the University Purchasing Directors to petition the State Purchasing Officer to suspend or the Chief Procurement Officer to debar a vendor from submitting future bids for violation of the Procurement Code and/or the Rules of the Chief Procurement Officer of Public Institutions of Higher Education. (12/08/11)
Procurement of Search Firm Services
The services of an external hiring search firm shall be retained by the University only as specified in this policy. A search firm may be retained to assist the Board of Trustees in the recruitment, selection, and hiring of a President or Chancellor. For all other positions, the Board of Trustees authorizes the President to retain an external hiring search firm to assist in the recruitment, selection, and hiring when a justifiable need is established and approved by the President based on any of the following qualifying criteria.
1. The position to be filled is of such a specialized nature or scope that use of an external search firm provides a more cost effective use of University resources.
2. The position to be filled requires a level of professional search expertise exceeding that available internally to the University.
3. The position to be filled is of such a critical nature or scope that it must be filled immediately, time being of the essence.
4. The diversity of the applicant pool will be significantly enhanced by services provided by an external hiring search firm. (11/08/12)
Information Security Plan Charter
Information Systems Privacy & Statement of Ethics
Southern Illinois University takes justifiable pride in the electronic information systems provided to its faculty, staff, and students. These resources include computer systems, software, data sets, and communications networks. Members of the University community may use these resources only for purposes related to their studies, instruction, the discharge of duties as employees, official business with the University, or other University-sanctioned activities. Any other use, unless specifically authorized, is prohibited. Access to the University's electronic information systems is a privilege to which all University faculty, staff, and students may be granted access to varying degrees. Certain responsibilities accompany that privilege; understanding them is important for all users. Those within the University community who make use of these resources are subject to high standards of ethics to insure the privacy, security, and proper use of data. Recognized as a primary educational, research, and administrative asset, the University's electronic information systems should be protected from unauthorized modification, destruction, disruption or disclosure-whether accidental or intentional.
User Responsibility for Security of Stored Information
The user is responsible for correct and efficient use of the tools each electronic information system provides for maintaining the security of stored information.
Confidentiality of Stored Information
Computing and networking resources may be used only in accordance with accepted University practice. Examples of inappropriate and unacceptable use of computing and networking resources include, without limitation:
Violation of the policies described herein for use of computing resources will be dealt with seriously. Violators are subject to disciplinary procedures of the University and, in addition, may lose computing privileges. Illegal acts involving the University's computing and networking facilities may also be subject to prosecution by local, state, and federal authorities.
Each campus shall:
The campus Information Security Officers, or their designates, shall meet annually to review the SIU System Information Security Plan and suggest modification as required.
Each campus shall maintain an information security plan that, at minimum, addresses the following:
Maintain acceptable or responsible use guidelines that include or address:
Ensure that workforce members receive training regarding:
Maintain Standards and guidelines for the classification of information the University creates, receives, maintains, or transmits.
Maintain standards and guidelines for the procurement of computing resources. Ensure that systems handling protected information are compliant with relevant requirements of applicable law and this Information Security Plan.
Securing Systems, Hardware, Data, and Software
Maintain standards for the equipment, applications, and devices deployed to ensure predictable operability and security of those devices. These standards are mandatory for computing resources involved in the processing and storage of protected information.
Ensure significant changes to computing resources are managed to establish that changes are reasonable and necessary; do not introduce unintended risk to the confidentiality, availability, or integrity of data; and are executed as planned.
Ensure workstations are configured, maintained, and employed in a manner to ensure the confidentiality, integrity and available of the information they contain.
Ensure information system software is regularly tested and updated to reduce risk of system vulnerability exploitation and malfunction.
Ensure information systems and data are adequately protected from malware or other destructive computer programs.
Maintain reasonable and appropriate protection for physical computing resources. Access to data centers, network closets, remote points of presence, etc. shall be appropriately restricted. Physical locations containing high-risk information assets shall receive additional protections. i.e. access logging, proximity badge access, video surveillance, etc.
Maintain standards for the backup, retention, recovery, and protection of critical data.
Maintain standards for reuse, destruction and disposal of computing devices and information. Disposal of physical assets and data must be done in accordance with applicable laws, regulations, and policies.
Maintain standards for the proper handling, tracking and disposal of protected information regardless of medium to prevent inadvertent disclosure.
Maintain network standards that include:
Ensure employees, contractors, vendors or any affiliates with access to computing resources or information assets are appropriately vetted by the appropriate University officials, managers, supervisors, and data stewards.
Ensure timely termination of user access to information systems, as appropriate, to protect the confidentiality and integrity of those systems.
Provide users the least privilege access to information systems necessary and appropriate to conduct University business need and perform University job duties.
Require individually assigned accounts and strong passwords to ensure access to information systems is appropriate and adequately logged.
Ensure remote network and application access is appropriate to individual users’ roles and responsibilities.
Business Continuity and Disaster Recovery Planning
Ensure business systems and business processes are prioritized by mission impact to establish criticality in the event of catastrophic failure. Assign appropriate backup and redundancy processes to critical systems. Maintain and regularly test a disaster recovery plan.
As appropriate, maintain procedures to ensure that critical University processes can continue in the event an information system is unavailable.
Information Risk Management
Regularly undertake a formal analysis of the risks and vulnerabilities associated with the security of protected information contained in or accessed through University computing resources.
Investigate, document, report, and remediate information security incidents as appropriate and required.
Maintain an inventory of systems and processes that store, process, manipulate or access protected information.
Ensure that exceptions to guidelines, policies and standards developed pursuant to this Information Security Plan are formally approved, documented and regularly reviewed in recognition of the balance between the rigidity and structure of standards with the necessity of effective operations and the limitations of available resources and technology.
 Information that is protected from release by state and/or federal law/regulation or would require SIU to provide notice to individuals and/or government agencies if information is lost, stolen or compromised; examples include protected health information (PHI/HIPAA), credit card numbers (PCI), banking information (GLBA), and protected student information (FERPA)
Pursuant to Section 3(h) of the Act (5 ILCS 140/3), Southern Illinois University has promulgated policies governing access to public records of the University in conformity with the Act. The purpose of the policies are to provide timely access to public records in the possession of the University while, at the same time, protecting legitimate privacy interests and maintaining administrative efficiency within the requirements of the State Records Act. 5 ILCS 160/1 et. seq.
The requester shall include the following information
in a request:
The FOIA Office(r) shall respond to all written request for public records other than requests for commercial purposes, within five (5) business days after receipt of the request, and within 21 business days after receipt of a request for commercial purposes, unless otherwise authorized by this policy or law. The calculation of the time period for response begins on the first business day after the public body receives the request.
Generally, public records will be available for inspection at the FOIA offices designated above in Section 3 between the hours of 8:00 a.m. and 4:30 p.m., Monday through Friday, except on State holidays and other University closures.
The requestor shall be notified in writing within five (5) business days after receipt of the request when and where the records will be available for inspection.
The University will notify the requester of the availability of the records for inspection within five (5) business days after receipt of the request or as extended pursuant to the Act.
The written notification shall admonish of the requester of the following:
Copies of public records shall be provided to the requester only upon payment of any fees that are due. There shall be no fee charged, however, for the University's cost of searching and reviewing the requested records. The availability of the record and the amount of the fee being charged shall be communicated to the requester within five (5) business days of receipt of the request, unless more time is authorized under the Act or this Policy.
If a person's request for public records has been denied in whole or in part by the FOIA Office(r), that person may file a request for review with the Public Access Counselor of the Attorney General's Office no later than 60 days after the date of the denial. The request for review must be in writing, signed by the requester, and include (i) a copy of the request for access to records and (ii) any responses from the public body.
A person whose request has been denied by the University may file suit for injunctive or declaratory relief pursuant to Section 11 of the Act, in either the circuit court where the University's principal office is located or where the person denied access resides. All communications involving litigation and/or a court summons arising out of a denied request under the Act shall be transmitted to the President's Office, Chancellor's Office, or the Provost and Dean's Office as appropriate immediately upon receipt.(01/17/08, 02/11/10, 07/24/14)
Acknowledgement: Because many universities have been involved in drafting Identity Theft Protection Policies to be incompliance with changes in the laws, these policies may look similar. This policy was developed in accordance with Sections 114 and 315 of the Fair and Accurate Credit Transactions Act, the Fair Credit Reporting Act, and the Federal Trade Commission regulations and guidelines (16 CFR Part 68). Additionally, several other university policies were reviewed in creating this policy including: Purdue University, UCLA University, and Kalamazoo College.(5/7/09, 07/24/14)
No university employee shall conduct any political
activity prohibited by the State Officials and Employees
Ethics Act on university-compensated work time (other
than "vacation, personal, or compensatory time off"),
nor shall any university employee misappropriate any
university property or resources for any prohibited
political activity. Nothing in this policy prohibits
activities that are otherwise appropriate for a university
employee or Trustee to engage in as a part of his or
her official university duties, or activities that are
undertaken by a university employee or Trustee on a
voluntary basis as permitted by law.
Upon completion of the annual disclosure form, or any update thereto throughout the year, any member shall disclose that a potential conflict of interest exists and advise the Chair and the General Counsel of such disclosure. In such an event, the Trustee shall be deemed an Interested Trustee and shall be governed by the Conflict of Interest procedures. A majority of disinterested Trustees may determine that a potential conflict of interest exists. Upon such disclosure, and if a majority of the then present disinterested Trustees at the meeting determine that a conflict of interest exists and is material to the particular matter being considered, all Board proceedings regarding such matters shall be governed by the Conflict of Interest procedures.Procedures
Members of the Board shall recuse themselves from any discussion, vote, decision or activity related to a matter which either they determine or the Board determines is a conflict of interest. The Board's determination shall be final and shall be based on the majority of disinterested Board members, i.e., those members not having a conflict of interest in the matter or activity.
Recusal shall mean the removal by the member or the Board of a member or members from acting as policymaker, judge, advocate or decision maker related to a particular matter of material substance to the University or Board.
A Trustee shall not accept any gift, favor, service, accommodation or other thing of value under circumstances from which it might reasonably be inferred that such gift, service or other thing of value was given or offered for the purpose of influencing him/her in the discharge of his/her official duties. A Trustee shall comply with the relevant gift ban provisions of the State Officials and Employees Ethics Act. A Trustee may, however, accept from University officials complimentary tickets to University-sponsored events.
A Trustee serves without compensation. However, he/she is entitled to receive payment for expenses incurred while representing the University in his/her official capacity.
Conflict of interest policies are governed by state and federal laws and statutes. As such, policies at many institutions can look very similar to that proposed by Southern Illinois University. This policy was developed in accordance with the Southern Illinois University Management Act (110 ILCS 520/0.01 et al.), the State Officials and Employees Ethics Act (5 ILCS 430/1-1 et al.), the Illinois Governmental Ethics Act (5 ILCS 420/1.101 et al.) as well as various Illinois Attorney General opinions, and state and federal appellate decisions. Additionally, policies from several other universities were reviewed including, but not limited to: University of Illinois, Northern Illinois University, Western Illinois University, American University, Boston University, Catholic University, Universi ty of Michigan, University of Minnesota, University of Tennessee, Vanderbilt University, Montclair State University, and University of Northern Colorado.(5/7/09, 12/12/13)
It is the policy of Southern Illinois University that all students, faculty, staff, and guests should be able to enjoy and work in an educational environment free from discrimination, and harassment. Discrimination against any person or group of persons based on race, color, national origin, ancestry, religion, sex, sexual orientation including gender identity, marital status, age, physical or mental disability, military status, unfavorable discharge from military service, or veteran's status is specifically prohibited in the Southern Illinois University community. This policy on non-discrimination and non-harassment reaffirms Southern Illinois University's commitment to maintain an environment in which ideas are pursued free of intimidation or fear, and the Policy applies to admissions, employment, access to and treatment in all University programs and activities.
Discriminatory harassment includes, but is not limited to, conduct (oral, written, graphics or physical) directed against any person or group of persons because of race, color, national origin, ancestry, religion, sex, sexual orientation including gender identity, marital status, age, physical or mental disability, military status, unfavorable discharge from military service, or veteran's status that has the purpose of or reasonably foreseeable effect of creating an offensive, demeaning, intimidating or hostile environment for that person or group of persons. Such conduct includes but is not limited to objectionable epithets demeaning depictions or treatment and threatened or actual abuse or harm.
Harassment of any kind is strictly prohibited and may also be a violation of federal and or state laws. Each Chancellor is authorized to develop or use existing procedures for his or her respective campuses to address discrimination and harassment.(3/13/03, 5/7/09, 04/14/11)
Plagiarism is presenting another existing work, original ideas, or creative expressions as one's own without proper attribution. Any ideas or materials taken from another source, including one's own work, must be fully acknowledged unless the information is common knowledge. What is considered “common knowledge” may differ from subject to subject. To avoid plagiarizing, one must not adopt or reproduce material from existing work without acknowledging the original source. Existing work includes but is not limited to ideas, opinions, theories, formulas, graphics, and pictures. Examples of plagiarism, subject to interpretation, include but are not limited to directly quoting another's actual words, whether oral or written; using another's ideas, opinions, or theories; paraphrasing the words, ideas, opinions, or theories of others, whether oral or written; borrowing facts, statistics, or illustrative material; and offering materials assembled or collected by others in the form of projects or collections without acknowledgment.
The following are terms and their definitions derived from scholarship on plagiarism and used in this working guide.
An act of plagiarism can be either intentional or unintentional. As an institution, our first recourse to fight plagiarism must be to try to eliminate unintentional plagiarism by educating all members of the University community as to what plagiarism is and how to avoid it.
Some instances of plagiarism are minor, involving small quantities of copied textual material, and these minor cases do not warrant extensive investigation. We do not endorse policies and procedures that might stifle the routine use of source material in all legitimate research and, thus, the dissemination of knowledge. The academy in general and this institution in particular, however, cannot abide the intentional misrepresentation of source material as one's own in order to fraudulently advance one's status within the academy or outside the academy.
That said, there may be extenuating circumstances involved even in cases of substantial intentional plagiarism. While such circumstances might mitigate punishment for such offenses, they cannot altogether absolve the intentional plagiarist from punishment. The SIU Board of Trustees then seeks to emphasize the responsible investigation of and just resolution to every case of intentional plagiarism. The distinction between institutionalized and competitive contexts within all academic disciplines should be recognized. Each campus and its academic units are encouraged to adopt policies and procedures to address plagiarism that recognize institutionalized and competitive contexts within all academic disciplines in each respective unit.
Finally, the context of student plagiarism is different from that of others in the academy and beyond academia. Although students may perceive the context of their work, at least at times, as being institutionalized, in fact, schoolwork is produced always within a competitive context. School assignments are intended to facilitate learning or to assess learning or both. Plagiarism undermines those purposes. The distinction between institutionalized and competitive contexts within all academic disciplines should be recognized; students should assume they always produce their schoolwork within a competitive context that does not allow plagiarism. Faculty members are encouraged to watch for developmental plagiarism in student work, and students should be given opportunities to learn from such cases.
In providing an appropriate response to any accusation of plagiarism, then, the following factors should be taken into account.
Equally important as having an informed plagiarism policy is its implementation. Research indicates that many university and college faculties nationwide are, like their students, uncertain about what constitutes plagiarism. We also strongly suspect that faculty members, staff, and students alike will not be sufficiently motivated without encouragement to seek out, read, and study our institution's plagiarism policies. Even then, institutional policy alone cannot fully educate a person in the subject of plagiarism. Given these limitations, we feel it is imperative that Southern Illinois University aggressively offer faculty members, staff, and students opportunities to learn how to correctly quote, paraphrase, summarize, cite, and document ideas and expression from sources and thus how to avoid unintentional and intentional plagiarism. To that end, committee members from SIU Carbondale have appended further recommendations that they believe would facilitate an adequate implementation on its campus of the University's plagiarism policy.
Southern Illinois University hereby credits the following non-exclusive list of materials and resources in the drafting and implementation of the policies, procedures and guidelines within the institutionalized context of the development of institutional policies and related materials:
References and Selected Resources
 Source: Webster's Third New International Dictionary of the English Language Unabridged, Springfield, Mass.: Merriam-Webster Inc., 1981.
 Source: Webster's Third New International Dictionary of the English Language Unabridged, Springfield, Mass.: Merriam-Webster Inc., 1981.
 University of Tampere, School of Modern Languages and Translation Studies, Foundations in Area Studies for Translators. Retrieved November 14, 2005, from http://www.uta.fi/FAST/PK6/REF/commknow.html.
 Rebecca Moore Howard, Standing in the Shadow of Giants: Plagiarists, Authors, Collaborators (Ablex, 1999); Rebecca Moore Howard, “Plagiarisms, Authorships, and the Academic Death Penalty,” College English 57 (1995): 708-736.(5/7/09)
The University has a legal obligation to preserve evidence and records, including electronic documents, relevant to a pending or potential claim or action. The purpose of this policy is to inform University employees and members of the Board of Trustees of the requirements and responsibilities for retaining paper and electronic records upon notice of pending or anticipated litigation.
This policy and procedures applies to all University personnel and covers all records, regardless of form, made or received in the transaction of University business. Examples of electronic records include but are not limited to electronic messages created using email and other new or emerging communication technologies, word processing documents, spreadsheets and databases.
As utilized throughout this policy, these terms are defined as follows:
“University personnel” includes all university employees, regardless of whether the employee is full-time, part-time, temporary, permanent, or student employee. For purposes of this policy, “university personnel” includes members of the Board of Trustees. It also includes subcontractors responsible for any activities related to storage of records or evidence, including but not limited to email storage, electronic data storage, or document storage.
“Evidence” includes all records and tangible items relating to a legal action or reasonably foreseeable legal action.
“Records” includes all records, whether in electronic, paper, or any other form, created, received, or maintained in the transaction of University business, whether or not such business was conducted at the physical location of the University or some other location, including home, and whether or not such records are stored at the University, in University computers, in a personal computer of University personnel, or any other location. Such records may include, but are not limited to, paper records and electronic records stored on servers, desktop or laptop hard drives, tapes, flash drives, memory sticks, external hard drives, DVDs, or CD-ROMs. “Records” includes all forms of electronic communications, including, but not limited to, e-mail, word processing documents, spreadsheets, databases, instant messages, calendars, voice messages, videotapes, audio recordings, photographs, SharePoint files, Wiki materials, telephone or meeting logs, contact manager information, Internet usage files, and information stored in PDAs, Blackberry devices, I-phones, other like devices, or removable media, including CDs, DVDs, thumb drives, etc.
“Legal action” includes a lawsuit or threatened lawsuit and investigation or threat of investigation by any administrative, civil or criminal authority.
“Legal hold” is an order to cease destruction and preserve all evidence including records, regardless of form, related to the subject of the legal hold.
Violations of the legal hold policy and procedures may result in disciplinary action up to and including termination of employment.(04/14/11)
The Board of Trustees of Southern Illinois University (University) adopts this Identity-Protection Policy pursuant to the Identity Protection Act (5 ILCS 179/1 et seq.). The Identity Protection Act requires each local and State government agency to draft, approve, and implement an Identity-Protection Policy to ensure the confidentiality and integrity of Social Security numbers the agencies collect, maintain, and use. It is important to safeguard Social Security numbers (SSNs) against unauthorized access and to limit the widespread dissemination of SSNs in order to reduce the potential for identity theft. The Identity Protection Act was passed in part to require local and State government agencies to assess their personal information collection practices and make necessary changes to those practices to ensure confidentiality.
1) Pursuant to the Act, this Policy does not apply
to the collection, use, or disclosure of a social security
number as required by State or federal law, rule or
2) Pursuant to the Act, this Policy does not apply to documents that are recorded with the county recorder or documents that are required to be open to the public.
Patient Health Identifier Program
If a federal law takes effect requiring any federal agency to establish a national unique patient health identifier program, and if Southern Illinois University complies with such patient health identifier program, then the University shall be deemed to be in compliance with the Identity Protection Act.
Embedded Social Security Numbers
Social security numbers shall not be encoded or embedded in or on a card or document, including, but not limited to, using a bar code, chip, magnetic strip, RFID technology, or other technology.
Social Security Number Protections Pursuant to Law
Whenever an individual is asked to provide a SSN, the University shall provide that individual with a statement of the purpose or purposes for which the University is collecting and using the SSN. The University shall also provide the statement of purpose upon request.
The University shall not:
In addition, the University shall not1:
Requirement to Redact Social Security Numbers
The University shall comply with the provisions of Illinois state law with respect to allowing the public inspection and copying of information or documents containing all or any portion of an individual's SSN. The University shall redact SSNs from the information or documents before allowing the public inspection or copying of the information or documents.
When collecting SSNs, the University shall request each SSN in a manner that makes the SSN easily redacted if required to be released as part of a public records request. "Redact" means to alter or truncate data so that no more than five sequential digits of a SSN are accessible as part of personal information.
Employee Access to Social Security Numbers
Only employees who are required to use or handle information or documents that contain SSNs will have access. All employees who have access to SSNs shall be trained to protect the confidentiality of SSNs.
This policy was developed using a template provided by the State of Illinois Attorney General's Office.
This Code of Ethics applies to all Community
members which includes: a) the members of the Board
of Trustees; and b) all employees, including
faculty, staff and student employees.
In carrying out Southern Illinois University’s teaching, research, public service, and patient care missions, members of the University community are committed to maintaining high ethical standards, striving for excellence, and complying with relevant laws and regulations. The Code of Ethics forms the ethical principles that will guide all members of the University community in all decisions and activities.
These principles are:
Respect. Community members will nurture a climate of care, concern, fairness, and civility towards others while recognizing and embracing each individual’s dignity, freedom and diversity.
Honesty and Integrity. Community members will act and communicate truthfully. They will make decisions based on the greater good, conducting themselves free of personal conflicts of interest or appearances of impropriety and self-dealing.
Cooperation and Communication. Community members will work together to support the institutional missions. Respecting confidentiality requirements, they will share information with stakeholders regarding the process used in developing policies and making decisions for the University.
Stewardship. Community members will use University resources in a wise and prudent manner in order to achieve the teaching, research, public service and patient care missions. They will not use University resources for personal benefit or gain. They will protect the integrity and security of confidential, proprietary and private information such as student and patient records.
Continuous Improvement. Community members will conduct University affairs diligently, exercising professional care and striving to meet the high expectations they have set for themselves as well as the expectations of those they serve.
Responsibility. Community members will be trustworthy and responsible for their conduct, decisions and obligations and will comply with all applicable laws, regulations, policies and procedures.
Accountability and Transparency. Community members will maintain accurate financial records and distribute them in a timely and transparent fashion.
Reporting Violations. Community members will report conduct in violation of these principles to appropriate authorities. Retaliatory action may not be taken against a Community member for reporting violations.
The Southern Illinois University Code of Conduct is based on these guiding principles. All members of the University community should integrate the Code of Ethics’ principles and the Code of Conduct’s standards into their daily University activities.
Nothing in this Code of Ethics nor related policies limits or alters the obligations of officials and employees to comply with the relevant provisions of the State Officials and Employees Ethics Act (5 ILCS 430/1 et seq.) (“Ethics Act”).
Many major universities have adopted excellent Codes of Ethics. This document was adapted from codes developed by Radford University and Washington University in St. Louis. (11/08/12)
1. INTRODUCTION AND PURPOSE
a) Introduction - The University values respect, integrity, honesty, cooperation, communication, stewardship, continuous improvement, responsibility, accountability and transparency and strives for excellence in carrying out its teaching, research, public service, and patient care mission. The standards of conduct in this Code, supported through policies, procedures, and workplace rules, provide guidance for making decisions and memorialize the University’s commitment to responsible behavior.
b) Applicability - This Code applies to the following members of the Southern Illinois University community: a) the members of the Board of Trustees; and b) all employees, including faculty, staff and student employees. The Code refers to all these persons as “members of the University community” or “community members.”
c) Purpose – This Code is a shared statement of commitment to uphold ethical, professional and legal standards. All community members must comply with the relevant policies, standards, laws and regulations that guide their work. Each community member is accountable for his/her own actions and, as members of the University community, are collectively accountable for upholding these standards of behavior and for compliance with applicable laws and policies.
d) Violations – This Code requires that suspected violations of applicable standards, policies, laws or regulations be brought to the attention of the appropriate office. Confirmed violations will result in appropriate disciplinary action, up to and including termination from employment or other relationships with the University. In some circumstances, civil and criminal charges and penalties may apply.
e) Questions – Questions regarding the intent or applicability of this Code should be directed to the Senior Vice President for Financial and Administrative Affairs and Board Treasurer.
The Board of Trustees is responsible for promoting adherence to this Code of Conduct by its members. The President and each Chancellor is responsible for disseminating and promoting adherence to this Code of Conduct by all SIU employees. Each administrator, department head, and department chair is responsible for promoting compliance with this Code and applicable standards, laws, policies, regulations and procedures; for informing employees of appropriate training opportunities; for ensuring that employees receive ongoing training; and for demonstrating compliance within their unit. Each employee is responsible for participating in training and education programs, referring to and complying with standards, laws, policies, regulations and procedures applicable to his or her work.
3. INTEGRITY AND ETHICAL CONDUCT
Ethical conduct is a fundamental expectation for every community member. Community members are expected to work together to maintain the highest standards of quality and integrity in fulfilling the University mission. Community members are expected to conduct University business transactions with respect, honesty, accuracy and fairness. Each member is personally responsible for his/her own actions and should strive to communicate ethical standards of conduct through instruction and leading by example.
4. RESPECT AND FAIRNESS
The University is committed to the principles of tolerance, diversity, and respect for differences. When dealing with others, community members are expected to be respectful, fair, civil, and truthful. The University prohibits discrimination and harassment and provides equal opportunities for community members and applicants.
5. CONFLICT OF INTEREST / CONFLICT OF COMMITMENT
Community members are expected to conduct University business free of personal conflict of interest or appearances of impropriety and self-dealing. Community members with other professional or financial interests are expected to disclose them in compliance with applicable conflict of interest and conflict of commitment policies.
6. ACADEMIC FREEDOM AND RESPONSIBILITIES
Creating an atmosphere conducive to providing a quality education is essential to achieving the University’s mission. Community members are expected to promote academic freedom and meet academic responsibilities. This includes encouraging discussions of relevant matters and creative expression, seeking and stating the truth, respecting those with differing views, submitting knowledge and claims to peer review, and working together to foster the education of students.
7. TEACHING AND RESEARCH
University faculty and researchers have an ethical obligation to the University and to the larger global community as they seek knowledge and understanding. Community members are expected to propose, conduct, and report research and teaching with integrity and honesty. They should protect human subjects involved in research, the rights of individuals and University intellectual property, and they should treat animals humanely. Community members should ensure the originality of their work and provide credit for the ideas of others upon which their work is built, be responsible for the accuracy and fairness of information published, and fully assign authorship credit.
8. FINANCIAL REPORTING
University accounts, financial reports, tax returns, expense reimbursements, time sheets and other documents, including those submitted to government agencies, should be accurate, clear, complete and transparent. Community members should follow University policies and procedures and sound financial practices. Community members are expected to exercise responsible fiscal management and use strong internal controls.
9. PROTECT AND PRESERVE UNIVERSITY RESOURCES
The University is dedicated to responsible stewardship. Community members are to promote efficient operations and engage in appropriate accounting and monitoring of University resources. Community members are expected to prevent waste and abuse of University resources. University resources include, but are not limited to, property, equipment, vehicles, finances, materials, systems, data communication and networking services, procurement tools, and the time and effort of faculty, staff and students. University resources may not be used for personal gain and may not be used for personal use except in a manner that is consistent with University policies and procedures.
10. COMPLIANCE WITH LAWS
Members of the University community should conduct University business in compliance with applicable laws, regulations, and University policies and procedures. When questions arise pertaining to the interpretation or applicability of a policy, community members should contact the individual who has oversight of the policy.
11. CONFIDENTIALITY AND PRIVACY
Community members receive and generate on behalf of the University various types of confidential, proprietary and private information. Community members should understand and comply with federal laws, state laws, agreements with third parties, and University policies and procedures pertaining to the use, protection, disclosure, retention, and disposal of such information.
12. REPORTING OF SUSPECTED VIOLATIONS
a) Reporting to Management – Members of the University community should report suspected violations of applicable laws, regulations, government contract and grant requirements and this Code to the Senior Vice President for Financial and Administrative Affairs and Board Treasurer, Ethics Officer, Compliance Officer, or other University official as designated within existing policies and procedures. The University complies with the Whistle Blower Protection Act (5 ILCS 430/15) and assures community members that possible violations can be reported without fear of retaliation.
b) Other Reporting – Nothing in this Code of Conduct or related policies limits or alters the obligations of officials and employees to comply with the relevant provisions of the State Officials and Employees Ethics Act (5 ILCS 430/1 et seq.) (“Ethics Act”).
c) Cooperation – Employees are expected to cooperate fully in the investigation of any misconduct.
Many major universities have adopted excellent Codes of Conduct. This document was adapted from codes developed by Washington University in St. Louis, Stanford University, Virginia Commonwealth University, and University of Minnesota. (11/08/12)
It is the intent of Southern Illinois University to regulate, subject to applicable law, the carrying (concealed or otherwise), possession, and storage of weapons, including without limitation firearms, on property under the control of the University.
The Board of Trustees hereby authorizes the Chancellor of Southern Illinois University Carbondale, the Chancellor of Southern Illinois University Edwardsville, and the Dean and Provost of the Southern Illinois University School of Medicine to each promulgate and/or amend policies, regulations and/or protocols ("Policies"), for their respective campus or locations, regulating the carrying, possession, and storage of firearms and other weapons. Such Policies shall adhere to all applicable law and shall provide due authority to enforce such Policies.
Pursuant to relevant portions of Illinois'
Firearm Concealed Carry Act, it is the duty of the
chief administrative officer of a university, or his
or her designee, to report to the Illinois State
Police any determination that a student poses a
clear and present danger to himself/herself or to
others. (430 ILCS 66/105) The Board of
Trustees hereby authorizes the Chancellor of
Southern Illinois University Carbondale, the
Chancellor of Southern Illinois University
Edwardsville, and the Dean and Provost of the
Southern Illinois University School of Medicine to
each promulgate and/or amend policies, regulations
and/or protocols ("Policies"), for their respective
campus or locations, setting forth procedures for
making such determinations and reports, including,
without limitation, permitting the Chancellor of
Southern Illinois University Carbondale, the
Chancellor of Southern Illinois University
Edwardsville, and Dean and Provost of the School of
Medicine to name a designee to make such respective
determinations and reports as required by law.