IT Policies and Standards
Accounts and Eligibility Requirements
- Account Creation—process for new and returning users
- Network Account Frequently Asked Questions—common questions about Butler computing accounts
- Network Account Eligibility Requirements—types of accounts and how to obtain one
- Graduate Access—what to expect once you graduate from Butler
- Disabled Accounts—process of disabling accounts and important considerations
University Computing Policies
Policy: Computer Use Master Policy
Dept. Responsible: Information Technology
Effective Date: March 1, 2010
Revised Date: December 20, 2009
Overview
Technology is a critical component in the pursuit of our mission as a university. It helps promote communication; facilitates research, work and discussion; and is an essential tool in the delivery of our teaching mission. It provides infrastructure needed to perform a wide range of University functions and to maintain essential University records. Technology can also help build a sense of community within Butler, as well as with the surrounding community in which we learn, live and work. But used in ways contrary to our goals, it can also be a powerful tool of harm. As such, it is critical that all who use Butler’s technology resources do so in fair and responsible ways and according to all applicable laws and University policies.
Butler also cherishes the privacy of personal content and freedom of expression that are at the core of intellectual pursuit and are fundamental to expression of teaching and learning. However, this must be balanced against the legal responsibilities, rights and risks of the University and others. This policy endeavors to balance the use of and need for technology, while creating an environment of respect and privacy and, at the same time, ensuring that the assets and reputation of the University are protected.
Scope
This policy applies to all users of Butler University’s computer and voice systems (hereafter referred to as “Butler Systems”): This includes all computer systems, Butler provided devices, data storage, related communication technologies, and information transmitted or maintained on these technologies.
Policy Statement
- Butler ownership & responsibility
- All Butler Systems are the property of the University unless explicitly defined otherwise through copyrights, law, the Butler University Intellectual Policy or a specific written agreement with the University. Butler University:
- Maintains the rights to all Butler Systems;
- Will take all reasonable and necessary steps to protect and secure systems and data; and
- Will employ tools reasonably necessary to ensure reliability of systems and the availability of its data.
- Butler maintains computer systems for the advancement of the University mission
- Access to Butler Systems is not in itself a right, but is a privilege provided to individuals with a legitimate need to access these systems.
- Acquisition of new computer systems and services will follow Butler procurement policies. This includes following standards established by Information Technology or obtaining approval of the Chief Information Officer on new systems or services.
- At any time, if this policy is violated, access to Butler Systems may be revoked.
- Your rights and responsibilities as a computer user are to:
- Use Butler Systems for University purposes:
- To pursue knowledge to further teaching and learning;
- To facilitate the execution of your employment duties and responsibilities; and/or
- For incidental personal use by faculty and staff.
- Use Butler Systems in ways that keep your personal data and the data of the University secure. This can be done by:
- Never sharing your password.
- Using strong passwords and changing them at a minimum of every six months.
- Never allowing others to use your network account or access.
- Using all available tools to help protect Butler Systems; see other policies for more details on identity theft, FERPA, HIPAA, etc.
- Signing off or locking your computer when not attended.
- Being aware of common threats to computer systems and accounts (virus, phishing, social engineered attack, etc.).
- Use Butler Systems in legal manner by:
- Sharing music, video, images, document, etc. only if you own or have permission to share such items.
- Using software and intellectual property provided accordance with software copyright and license agreements.
- Building community and relationships while not harassing or defaming others.
- Accessing all systems and data for which you have permission, but not attempting to or gain unauthorized access to systems or data to which you do not have access.
- Not impersonating others.
- Not attempting to disrupt other users or University computer system operations.
- Abiding by all applicable federal, state and local laws.
- Abiding by all University policies.
- Use Butler Systems in an ethical manner:
- By fostering the high ethical standards of the University.
- By refraining from use of technology for academic dishonesty (i.e., plagiarism or cheating).
Administration of Policy
The oversight of this policy is the responsibility of the CIO and should be reviewed annually.
Related Policies
- Fair, Responsible and Acceptable Use Policy
- Procurement Policy (located on BUfiles in general\Forms\Business Forms\Business Policies)
- Privacy of Personally Created Content
- Employee Code of Responsibility for Security & Confidentiality of Information
- Identity Theft Information – Storage, Disposal, Breach & Red Flags
- Federal HIPAA (Health Insurance Portability and Accountability Act)
- Federal FERPA (Family Educational Rights and Privacy Act)
Revision History
Approved by the Board of Trustees: February 26, 2010
Approved by Sr. Administrative Group: January 19, 2010
Approved by the Information Management Council: December 20, 2009
Prior Update: June 2, 2002
Originally created: May 13, 1994
Related Usage Standards and Resources
Name: Computer Support Standards
Scope: Faculty & Staff Members
Department Responsible: Information Technology
Effective Date: October 1, 2000
Rev. Date: 7/7/16
Computer Support Standards
The purpose of these standards is to ensure an information technology infrastructure that promotes the academic mission of the University in teaching, learning, research, and administration. The specific goal is to define computer-related hardware and software support standards that will be provided by Information Technology. These standards apply to:
- All University-owned computer hardware
- All University-owned computer software
- All users of computer systems, including but not limited to University students, faculty, and staff
Any item submitted for support must be installed on a system with a University Identification Number.
The priority of computer support for the University community is:
- Computer labs and Classrooms, including Media Services equipment
- Faculty desktop systems
- Departments that directly serve the academic mission of the University
- Non-academic departments
- Affiliate programs
These standards do not apply to administrative applications (such as Schedule 25, PeopleSoft, etc…); these applications are supported separately by Information Technology.
Software Support
Information Technology has established three levels of software support
- Full Support (for Standard University-wide Supported Software)
- Limited Support (for Non-Standard, Department-Specific Software)
- Special-case Support (for Non-Standard, Classroom Instruction-Specific Software)
Full Support
Information Technology is responsible for licensing, installation, maintenance, and troubleshooting of all Standard software. This support includes:
- Purchasing and licensing
- Initial installation on new or existing machines
- Updates, service packs, patches, and repairs
- Upgrades to newer versions (once licensed, tested and approved by Information Technology)
- Phone support for commons questions through the Help Desk (ext. 4357)
Application Support through Information Technology
Training and Classroom support through Information Technology Software packages and services included are (current for Summer 2016):
- Microsoft Windows 10
- Apple Mac OS 10.9 and higher
- Microsoft Office 2011 (Macintosh), Office 2013 (Windows), or Office 2016 (Windows)
- Microsoft Internet Explorer 11.x
- Adobe Acrobat Reader 11.x
- Butler email
- Butler Canvas
- Butler Listserv system (email lists)
- SPSS (Limited to those with licenses)
Limited Support
This includes software packages in use by various departments or individuals on campus that are not supported campus-wide. These packages are typically departmental or discipline specific, and are not widely used by other departments. Information Technology does not have any expertise with these applications, and does not provide technical support beyond the following:
- Initial installation
- Updates, service packs, patches, and repairs (provided by the user, not Information Technology)
- Version Upgrades (provided by the user, not Information Technology)
- Troubleshooting as related to system performance, not application related.
- Departmental and/or Individual Responsibility:
- Initial Purchase
- Purchase of additional Licensing
- Purchase of Version Upgrades
- Training and Classroom support
- Application and Technical support is through the Vendor or Manufacturer
- Typical Limited-support Applications:
- Adobe Acrobat
- Adobe Illustrator
- Adobe Photoshop
- Adobe Premier
- QuarkXPress
- iTunes
- WordPerfect
Special-Case Support
In some special cases, Information Technology may provide additional support for typically non-standard software applications. This is on a case-by-case basis, and is typically reserved for support of software used for classroom instruction. Information Technology does NOT purchase this software, nor does it provide licenses or upgrades. Information Technology will provide all of the support listed for Limited-support software (see above), and will provide some application support and troubleshooting. Actual usage of the software will be the responsibility of the individual instructors or department.
Non-Supported Software
In some cases, software or services are specifically not supported by Information Technology. These items may have inherent security risks, known problems, or other issues. Please do not ask for support on these items or install them on University owned equipment.
- File sharing application
- Video Games (Computer and Console)
Computer Hardware Repair Guidelines
These guidelines govern all University owned computer hardware.
Any item submitted for repair must have a University Computer Center Number (UCC#).
Personal equipment will not be repaired for any reason.
Repair priority is as follows:
- Computer Labs and Classrooms (including Media Services equipment)
- Faculty desktop systems
- Departments that directly serve the academic mission
- Non-academic departments
- Affiliate programs
Repair times are affected by parts availability and priority of repair
Warranty Repairs
- Systems under warranty will be repaired per the warranty
- 3 year warranty on any computer hardware or peripherals is required
- Departments are encouraged to purchase extended warranties beyond three years on equipment that will remain in use.
- HP and Apple computers will be repaired on campus
- Hewlett-Packard printers will be repaired on campus
- Computers and peripherals from other sources may be repaired by an outside agency
- There will be no charge to the user for any warranty repair
- Reminder: warranty repairs do not cover misuse or abuse.
Non-warranty repairs:
- Systems 3 years old (as defined by their purchase date from vendor) will be repaired to the extent necessary to maintain full functionality.
- There will be no charge to the user for computer repair for systems d 3 years old.
- If the repair is not the result of a defect or failure (ie: abuse or misuse), the user’s department may be charged for materials. There will be no charge for labor by IT, though any labor charges incurred by outside agencies will be passed to the department.
Repairs on systems four years old will include the following.
- Drives (floppy, hard disk, CD, etc…)
- Power Supplies
- Original equipment keyboards and Mice
- Monitors
- If the repair is due to abuse or misuse and not from hardware failure, the users department may be charged for materials and any labor charges incurred by outside agencies will be passed to the department.
- Systems five years old or older will not be repaired by IT, and will be the responsibility of the user’s department to replace.
- Systems downgraded to “legacy” by the manufacturer will not be serviced.
Departments should take the initiative and replace aging systems to avoid down time.
Consumable Items
Consumable items include, but may not be limited to, laptop batteries and removable media (DVD-ROMS, CD-ROMS, flash drives, etc…). These items often carry a separate warranty from the manufacturer. If they fail while under this warranty, IT will assist in having them replaced. If these items fail or wear out outside of their warranty period, then IT can assist in replacing them, but is the department’s responsibility to cover costs.
Important Note:
Data stored on individual machines is the responsibility of the user. Information Technology will make every attempt to preserve data, but backups and duplicate copies are the responsibility of the user. If you are unable to back up your data before service, you MUST inform Information Technology before the machine is picked up for service. We cannot be responsible for data loss due to user error or lack of communication. Please keep a backup on the network or removable media.
New Computer Hardware Purchasing Recommendations
Information Technology maintains a list of recommended hardware for new purchases and upgrades/replacements. This list is intended to assure compatibility with current standards, match our current support and maintenance contracts, and position the University for future expansion and upgrades. All items listed are known to be of good quality and have the requisite 3 year warranty included or available. Warranties of 3 years or greater are required for all computer, printer, and monitor purchases. Extended warranties on other peripherals, such as scanners and external drives, are highly recommended. Information Technology will not perform any repair work on out of warranty peripherals. Information Technology reserves the right to approve all computer hardware purchases. We will make every attempt to meet the needs of the purchasing department while respecting the best interest of the University. Items ordered by bypassing Information Technology’s approval may be explicitly barred from support by Information Technology.
When submitting a requisition to Purchasing, please either include a copy of the recommendation with your purchase request marked or transfer the exact specifications to your requisition form.
Used Computer Re-Allocation
All University-owned computers replaced with new equipment should be returned to Information Technology. In some instances, departments and colleges may request that a computer be used to replace another staff/faculty member’s equipment. Information Technology will approve this if:
- The used equipment is still serviceable by Information Technology (see the Hardware Support Guidelines)
- The used equipment is significantly better than what it replaces
- Only one “trickle-down” per department per new purchase
- Preference is given to the oldest computer in the department
Departments or Colleges may request a used computer from Information Technology to be used for non-critical applications. However, Information Technology does not maintain a pool of available computers for permanent allocation. When a machine is approved for use by another department, that department may be responsible for any needed upgrades, repairs, or extended warranties needed to return the machine to service. Under no circumstances will a machine that does not meet the Hardware Support Guidelines be returned to service.
- You must have a valid Butler ID or active Butler Network Account (username and password) to use a computer lab
- Academic use takes priority over all other uses
- Installation of additional software (games or otherwise) onto lab or classroom equipment is prohibited. The installation of illegal or unlicensed software is a federal offense, not just University policy
- Printing should be limited to one copy
- Equipment maintenance is to be handled by IT staff only.
Prohibited Wireless Devices
Butler’s Computer Use Master Policy allows Butler users to connect their own devices to the campus network. In order to maintain optimal network operations, IT does not allow access to devices that require any modification to the existing campus network or interfere with its normal operation. To this end, certain devices are not allowed on the Butler University network unless approved by Information Technology. These devices include, but are not strictly limited to:
- Wireless Access Points (e.g., Apple AirPort Base Stations, Linksys Access Points, or Gateways)
- Routers (e.g., Cable/DSL routers)
- Any device or computer running network server services such as DHCP, DNS, SMTP, WINS, or acting as a network router (e.g., Windows Internet Connection Sharing)
- Non-Bluetooth wireless peripherals including:
- Wireless speaker systems for your PC or stereo
- Wireless printers (or disable wireless and print via USB)
- Wireless Access Points (WAPs) or Routers (including Apple Airport Devices)
- Computers with Ad-Hoc Wireless Networks (Microsoft or Apple Internet Connection Sharing)
- Zigbee or Wireless USB (2.4GHz) Devices
- Devices designed for personal home networks, such as Chromecast
These devices and services are known to interfere with the operation of the Butler University network. Operation of these devices or services is a violation of University policy, and will result in loss of network access and/or disciplinary action. Intentional interruption of Butler University network services will result in further disciplinary action and/or prosecution. Click here for the complete Computer Use Master Policy. Remember, the master policy and these standards are NOT to discourage technology use, but to promote and maintain a reliable network for all to use.
Approved Wireless Devices
- Bluetooth 2.1 (or higher) compatible devices (keyboards, mice, audio headsets, etc.)
- Client devices with Wi-Fi certified 802.11a/b/g/n wireless capabilities including:
- Laptops and Desktops
- Smartphones (iOS, Android, etc.)
- Tablet computing devices (iPad, Kindle, Surface, etc.)
Note: Chromecast may not fully function on the Butler network.
Due to the unique nature of many consumer devices and Information Technology’s (IT) limited ability to manage, upgrade, and repair them, IT only offers two levels of support for smartphones and non-standard devices. Butler standard devices are listed here. If a device is not on the Butler standard list, it is considered non-standard.
Basic support includes advice and general troubleshooting as they relate to:
- Butler WiFi
- Butler Email setup
- Connection to computer
- Updating of device operating systems or firmware
Basic Support Does Not Include:
- Reconciling billing issues with carriers
- Repairing hardware
- Non-vendor compliant hardware (i.e., third-party hacked or jail broken phones)
- Non-IT created application support
For these issues, please contact your wireless provider directly.
Information Technology offers a wide range of classroom- and event-related technologies and support on Butler’s campus. Please adhere to the following standards when working with IT.
Equipment Requests for Classes and Events
When requesting deliverable media equipment for all classes and events, you must notify IT of your needs at least 2 business days in advance. If you fail to provide adequate notice, IT reserves the right to deny your request regardless of circumstance.
Who Can Request Equipment
Faculty and Staff can make equipment requests for on-campus classes and events through IT. With an instructor’s permission, students can request equipment for on-campus, classroom use. Students will be asked to provide a valid Butler ID when picking up the equipment.
For on-campus equipment requests for student group events, groups must obtain permission from their Faculty advisor.
Outside groups wishing to request equipment must do so through the office of University Events. Fees may be assessed.
Off-Campus Use of Equipment
For Butler-specific off-campus events, IT will allow Faculty and Staff to use deliverable media equipment. IT will not deliver equipment for off-campus events; Faculty and Staff must arrange to pick requested equipment up from IT’s office in HB315 and will be held responsible for the care and condition of on-loan equipment.
IT does not generally allow off-campus use of resources for non-Butler-specific events. Faculty and Staff with special needs in this regard may contact IT. IT reserves the right to examine individual circumstances when requests of this nature are made. In the event an individual’s request cannot be met, IT can suggest alternate media rental outlets in Indianapolis.
Equipment Failures
If a delivered or installed piece of media equipment fails, IT will attempt to solve the problem first by troubleshooting the malfunctioning equipment. If this does not offer a reasonable solution to a problem, IT will provide replacement equipment. The number of resources available at a given time is very limited, and therefore circumstances will arise where replacement of a failed piece of equipment is not an option.
If at any time you notice a piece of media equipment failing, please contact IT and provide all pertinent information.
Name: Blogging Standards
Scope: Faculty & Staff Members
Department Responsible: Information Technology
Effective Date: May 14, 2012
All members of the Butler University community who maintain content within Blogs @ Butler are expected to adhere to the following standards:
- Butler University encourages and promotes the free expression and exchange of ideas through department, personal, group, or club blogs.
- The content of all blogs operated through Butler University are open to public comment at the administrator’s choice. The comments are the responsibility of individual users and members, including Butler students, faculty, and staff, and do not necessarily reflect the opinions or policies of Butler University.
- The Butler University website will not link to or promote any blog that does not adhere to published policies and guidelines for blogging and computer usage.
- Think prior to posting. Even with strict privacy settings, information posted to blogs should not be considered private. If you would not say something in public, do not say it online.
- Be civil and respectful, and never post vulgar, obscene, defamatory or libelous remarks. You can be held legally liable for comments you make online.
- Do not post confidential or proprietary information. Faculty and staff must adhere to all Butler University policies and procedures, as well as Federal standards, such as FERPA and HIPAA.
- Be respectful of copyrighted and trademark information, including Butler University logos and marks. This extends to the intellectual property of the University and that of the faculty, staff and administration who work for it. Please refer to the Marketing website for more information regarding logo usage and editorial standards.
- Butler University reserves the right to remove any content or ban any user that violates these standards or any other established campus policies. Please review all University Computing Policies to understand your rights and responsibilities.
Administration of Standards
The oversight of these blogging standards is the responsibility of the CIO, and they should be reviewed annually.
Related Policies
- Fair, Responsible and Acceptable Use Policy
- Privacy of Personally Created Content
- Employee Code of Responsibility for Security & Confidentiality of Information
- Identity Theft Information – Storage, Disposal, Breach & Red Flags
- Federal HIPAA (Health Insurance Portability and Accountability Act)
- Federal FERPA (Family Educational Rights and Privacy Act) see Student Handbook
Dept. Responsible: Purchasing/Campus Impressions/IT
Effective Date: 6/7/12
Rev. Date: N/A
1.0 Purpose
Butler University’s Document Hardware Management Standards provide a uniform and consistent approach to the allocation and usage of all document production assets across campus. These assets include but are not limited to items listed under “Definitions”.
These standards address how document production hardware can be cost-effectively managed across the entire University. Each individual department and college should use these standards along with the “best practices” contained in this document to assess their needs.
2.0 Scope
These standards apply to faculty, staff, and all others performing tasks on behalf of Butler University including but not limited to contractors, affiliates, student workers, and third-party providers.
Student printing is not covered by these standards.
3.0 Policy
In an effort to maintain a cost effective and productive working environment, all document production assets will be allocated based on the following criteria and charged at the appropriate rate:
- Consolidating devices when it makes sense (see section 3.1 Device Consolidation)
- Average monthly volume, departmental functions and specific document output needs (see section 3.2 Sizing and Usage Grid for Copiers and Printers)
- Distance (see section 3.3 Distance)
Standard models will be provided with optional features to provide consistency among departments and colleges and address specific departmental requirements. Asset placement and usage will be reviewed as required or necessary with departments to maintain a cost efficient print environment, to ensure the most effective use of document production resources and to improve employee productivity and departmental workflow efficiencies.
3.1 Device Consolidation
Multiple devices including copiers, printers, faxes and scanners, that are located within a close, unimpeded proximity, will be combined into a multifunction device (MFD) unless cost prohibitive. Duplication of equipment and functions will be minimized within reason. Multiple devices will be considered for areas with volume justification.
3.2 Sizing and Usage Grid for Copiers and Printers
The cost associated with an asset increases with its speed, volume and capabilities. The chart below will be used to help determine the correct device based on volume bands and features.
| Volume Band | Impressions per Month | Output Speed | Letter Legal Tabloid | Duplex | Staple | Fax Scan OCR | Color | Print from USB | Other (envelopes, checks, etc.) |
| Low | 0 – 5000 | 17-29 cpm | |||||||
| Mid | 5001-18000 | 30-49 cpm | |||||||
| High | 18001 – 50000 | 50+ cpm |
3.3 Distance
A networked document output device will be made available to faculty and staff within reasonable proximity to their work area (50 feet/printer, 100 feet/copier). No one will have to walk an unreasonable distance or be presented with obstacles (e.g., locked doors, multiple doors, stairs, etc.). The distance requirement will be waived for a department or college where daily work processes require printing, copying and/or involve heavy client interaction. Special consideration will be given to those with mobility impairments. Color printing will be available as required.
4.0 Procurement of New and Replacement Printers
- Requests for a new or replacement device should be made through the IT Help Desk.
- Standard model devices must be used unless there is a justified need for a higher level specification model.
- Additional devices will be considered for an individual or work group based on a substantiated business need and endorsement by the department head or above.
- Local printers (as defined in section 6.0) are not permitted except for locations where one or two staff members have a significant physical separation (e.g., different floor or building, etc.).
- Butler will not support personal printers (as defined in section 6.0).
- Procurement of new or replacement devices must be approved by Director level or above.
5.0 Best Practices and Recommendations:
- Black and white printers are to be used in preference to color printers.
- Color printing should only be utilized where it is required to convey important information that would be lost in black and white. Only the necessary pages in the document should be printed in color. Other exceptions may also apply (e.g., signage, marketing materials, etc.) when printing in color may convey the message more effectively.
- Confidential information which is printed must be collected from the printer immediately and it is the responsibility of the person to ensure confidentiality. To learn more on how to print using secure features, contact the IT Help Desk.
- Output devices are to be used for business purposes only.
- Only the necessary pages in the document are to be printed/copied.
- Double sided (duplex) printing is highly encouraged whenever possible.
- A copier should be used in preference to a printer when producing a large amount of copies.
- Large capacity copying/printing jobs (more than 100 pages) should be sent to Campus Impressions. Please use Campus Impressions for submitting electronic files. PDF is the preferred file format to ensure high quality output.
- Accept assignments electronically and encourage students to submit assignments electronically using the learning management system or email.
- Use electronic document sharing whenever feasible.
- Print to PDF and save to the network, USB drive or other space when possible.
- Email PDFs instead of a hard copy.
- Use print preview to ensure you are going to get what you expect.
- Cancel mistakes or duplicate jobs BEFORE they print.
- Print presentations with multiple slides on a page.
- Change your default margin size to be slimmer.
- Organize email electronically (don’t print and file unless it is absolutely necessary).
IT is happy to provide assistance on reducing your printing; contact the IT Help Desk for assistance.
6.0 Definitions
- Black and White Laser Printer‐ A printer that is only capable of printing in one color (black) at a time. The laser “paints” the image onto a drum, which is then transferred onto paper.
- Color Laser Printer‐ A printer that is capable of printing more than one color. The colors (yellow, cyan, magenta and black) are applied to the drum and are then adhered to the paper.
- Local Printer‐ A printer that is purchased by Butler but not residing on the network and attached to ONLY one computer and/or workstation via a USB printer cable.
- Multi Function Device (MFD)- A printer or copier capable of a variety of tasks (i.e., copying, faxing, printing and scanning) within the same device and is connected to a network and (generally) accessible by computers on that network.
- Personal Printer‐ A printer that is purchased by an individual and not residing on the network and attached to ONLY one computer and/or workstation via USB printer cable.
- Document Production Asset- Includes printers, copiers, scanners, MFDs, and stand-alone faxes.
7.0 Administration
Operational responsibility of these standards is delegated to the Vice President for Finance and Administration and Chief Information Officer. Periodically or as required, these standards will be reviewed to ensure they are up-to-date and applicable in the current environment.
8.0 Related Policies
None
9.0 Revision History
Created January 2012 and effective 6/7/12
Butler’s Computer Use Master Policy allows Butler students to connect their own devices to the campus network. In order to maintain optimal network operations, IT requires that certain security standards be met.
Antivirus Protection
Every student should have functioning and up-to-date antivirus software installed on each of their computers. Once installed, it is the student’s responsibility to keep the program up-to-date and periodically scan their computer for viruses. Computers found to be infected by a virus will be removed from the network due to the security risk(s) they pose.
Updates
Automatic operating system updates must be enabled on all computers, tablets, and smartphones in order to better protect your devices. Learn more about automatic Windows and Mac updates.
Firewalls
Firewalls must be enabled on all computers. Learn how to enable your Windows or Mac firewall.
