Defined as
- Any action without authorization from the university which allows an individual to access, use, modify, destroy, disclose or take data, programs or supporting documentation residing in or relating to a university computer, computer system or computer network.
- Any action that causes the denial of computer system services to an authorized user of such system.
- Any violation of the Information Technology Policy and the Information Technology Conditions of Use statement.
Examples of violations include
- Use of university technology to harass or harm any person
- Unauthorized access to or unauthorized use of Information Technology equipment and resources
- Use of resources in violation of any applicable law or regulation
- Creation and/or use of false user accounts
- Unauthorized use of another user’s account
- Use of network packet sniffing software outside the classroom
- Placing rogue hardware on the LAN for the purpose of exploiting network security and policies
- Any activity that attempts to circumvent the LAN security
- The posting on university-owned computers of material that may or will be perceived to be offensive to others
- Use of university technology to violate copyright laws
- Use of phone or computer technology to perpetrate false charges
- Activities that constitute theft of service (e.g., unauthorized printing)
- Sending an email using another person’s account without written permission
- Impersonating another person in any electronic communications without written permission