Use of University Computers
Improper conduct regarding computer use at the university falls into three categories: (1) academic dishonesty; (2) disruption and destruction of computer facilities; and (3) violation of licenses and copyright agreements, university policy, and state or federal laws.
1. Academic Dishonesty
Academic dishonesty is covered in Section IV of this code. Examples of this type of behavior regarding computers include, but are not limited to:
- Submitting another person's programs, documentation or program results as your own work;
- Obtaining or attempting to obtain unauthorized access to information stored in electronic form;
- Submitting false results of a program’s output for a class assignment or falsifying the results of program execution for the purpose of improving a grade.
2. Disruption or Destruction of Computer Facilities
The disruption or destruction of computer facilities is covered in Subsection B (18) of this code. Examples of this type of behavior include, but are not limited to:
- Damaging or stealing university-owned equipment or software;
- Causing the display of false system messages;
- Maliciously causing system slowdowns or rendering systems inoperable;
- Changing, removing or destroying (or attempting the same) any data stored electronically without proper authorization;
- Gaining or attempting to gain access to accounts without proper authorization;
- Putting viruses or worms into a system.
3. Violation of Licenses and Copyright Agreements
Most software used on university computers is covered by copyright, license or nondisclosure agreements. Violation of these agreements puts the university and the individual in jeopardy of civil penalties. Examples of such violations include, but are not limited to:
- Making copies of copyrighted or licensed software without proper authorization;
- Using software in violation of copyright, license or non-disclosure agreements;
- Using university computers for unauthorized private or commercial purposes.