Indiana University expects IU Blogs and related information technology resources will be used in a lawful manner and in support of the university’s mission of research and creative activity, teaching and learning, and civic engagement.
IU Blogs is a platform designed for blogging purposes only. Users are granted permission to create, publish, and manage blog content within the IU Blogs platform. The use of IU Blogs is limited to blogging activities and does not include website development or any other related services.
IU Blogs offers a variety of plugins, themes, and features to enhance your blogging experience. These tools are continually being updated and improved, so it’s possible that some of them may change or be removed without notice. The IU Blogs Administrators will give notice of changes when possible.
IU Blogs accounts are provided to individuals with university accounts that authenticate through IU Login. Individuals may not share with or transfer to others their university accounts, including network IDs, passwords, or other access codes that allow them to gain access to IU Blogs.
IU Blogs may not be used in a manner that violates the law, for private commercial activities that are not approved by the university, for personal private gain, or for political campaigning and similar activities that are inconsistent with the university’s tax-exempt status.
Only Public and University-Internal data are suitable to be stored in IU Blogs. Restricted and Critical data cannot be stored in IU Blogs. For definitions of Public, University-Internal, Restricted, and Critical data, see Classification levels of institutional data. In addition, federally and state-protected data, human subjects research data, and passwords cannot be stored in the WCMS. For more about data classifications, see About sensitive data at IU.
Indiana University will handle reports of misuse or abuse of information and IU Blogs in accordance with existing policies and procedures issued by appropriate authorities. Depending on the individual and circumstances involved, this could include the offices of Human Resources, Vice Provost or Vice Chancellor of Faculties (or campus equivalent), Dean of Students (or campus equivalent), Office of the General Counsel, and/or appropriate law enforcement agencies. See policy IT-02, Misuse and Abuse of Information Technology Resources, for more detail.
- Created May 3, 2021
- Posted May 2021
- Added Data storage section October 2022
- Updated June 14, 2023