Examples of Reportable Acceptable Use Violations

  • A University employee uses the access they have for their job to look at private data not related to their job, for personal or other reasons or simple curiosity. (Inappropriate Use)
  • A user uses tools that are used to assess security or to attack systems or networks (e.g., password crackers, vulnerability scanners, network sniffers) for which they are not authorized by the University to use. (Inappropriate Use and Unauthorized Access)
  • An instructor posts grades on the web in a manner in which a student can be personally identified. (Inappropriate Disclosure)
  • A user runs an exploit tool to gain access to a University server. (Unauthorized Access)
  • A user installs malicious software on a University computer. (Malicious Code)
  • A user shares their University password with a friend/family. (Inappropriate Disclosure)
  • A user makes a single-user licensed software available to others. (Copyright and Licensing Violation)

Report acceptable use violations by following Administrative Procedure: Report Information Security Incidents.

Document Feedback

Notification: Please be aware that while we rarely receive these data requests, any information submitted through this comment form is public, including your name, email address and comment/question, unless you are a student.