Sidebar
Sidebar
Table of Contents
TOC placeholder
Governing Policy
Questions?
Please use the contact section in the governing policy.
To report acceptable use violations follow Administrative Procedure: Report Information Security Incidents.
These are examples of reportable acceptable use violations. This is not an all inclusive list. Users are prohibited from engaging in the following activities:
Inappropriate Use or Disclosure
- Posting grades on the web in a manner in which a student can be personally identified.
- Sharing a University account password with anyone else.
- Using access granted to look at private data not related to your job, e.g., for personal or other reasons or simple curiosity.
- Installing or running malicious software on a University computer.
- Mining cryptocurrency using University IT resources.
- Attempting database manipulation to access information not intended to be accessible.
- Sending messages to harass or intimidate another person(s) (such as broadcasting or repeatedly sending unwanted mail), conducting personal business, or mass mailing that is solicitous in nature unless the mailing is in an authorized conduct of University business.
- Sharing an internet connection with the University's network for profit.
- Using a University email account for private business or for personal commercial gain.
Unauthorized Access
- Attempting to assess or circumvent security, or attacking systems or networks (e.g., password crackers, vulnerability scanners, network sniffers, or keyloggers) without appropriate authorization.
- Using an exploit tool to gain access to a University system, network, or application.
- Using authentication credentials for an account, system, network, application, or other IT resource that were not explicitly granted to the user for their authorized use.
Violation of Law or Other Policies
- Violating a single-user license by making the software available to multiple users.
- Storing, transmitting, or viewing illegal content using University IT resources.
- Using University IT resources to transmit copyright-protected materials without the copyright holder's stated permission, e.g., sharing media without authorization via peer to peer software.
- Sending personal campaign emails using University IT resources. See Administrative Policies: Public Service: Campaigning for or Holding Public Office and Copyright Ownership.
For additional examples of information security incidents, see Recognize and Report Information Security Incidents.