Date of Current Revision:

Any use of technology in a manner that infringes on the rights or privacy of others or any use of technology that constitutes a misuse of an existing computing or electronic system is prohibited. Examples of misuse include but are not limited to the following activities:

J5-101 Committing computer fraud through creating false identities, forgery, harassment, personal abuse, trespassing, theft, embezzlement or invasion of privacy. Under no circumstances does the university condone or permit the use of another person's e-I.D., telecommunications account, or access privileges.

J5-102 Tampering with using files or information belonging to someone else without permission. Under no circumstances does the university condone or permit the unauthorized access or use of another person's files (whether inside or outside the computer system).

J5-103 Using a computer or other technology to examine, modify, or copy programs or data other than one's own without proper authorization. This includes plagiarism and/or violations of copyright. Under no circumstances does the university condone or permit the unauthorized copying of computer software or other copyrighted material.

J5-104 Degrading or attempting to degrade computer or other technological hardware or software performance to alter or circumvent established security measures.

J5-105 Depriving or attempting to deprive other users of access to computing/network resources or services or other technology. Under no circumstances does the university condone or permit the intentional abuse or interference with the operation of any university computer, network, telecommunications system, or other technology; the intentional interference with the work of other users; or the wasting of computer or other technology resources.

Back to Top