体育买球

Skip to main content
皇冠体育-皇冠体育博彩官网 博彩app-体育博彩app-体育博彩app推荐 体育博彩平台-体育博彩平台推荐 博彩平台-亚洲博彩网站 太阳城app-澳门太阳城app下载 博彩平台 金沙娱乐城 太阳城app 沙巴体育官网 世界杯官网买球平台

Unauthorized Use of Information Technology

Defined as:

  • Any action without authorization from the university which allows an individual to access, use, modify, destroy, disclose or take data, programs or supporting documentation residing in or relating to a university computer, computer system or computer network.
  • Any action that causes the denial of computer system services to an authorized user of such system.
  • Any violation of theInformation Technology Policyand the Information Technology Conditions of Use statement.

Examples of violations include:

  • Impersonating another person in any electronic communications without written permission
  • Use of university technology to harass or harm any person
  • Unauthorized access to or unauthorized use of Information Technology equipment and resources
  • Use of resources in violation of any applicable law or regulation
  • Creation and/or use of false user accounts
  • Unauthorized use of another user’s account
  • Use of network packet sniffing software outside the classroom
  • Placing rogue hardware on the LAN for the purpose of exploiting network security and policies
  • Any activity that attempts to circumvent the LAN security
  • The posting on university-owned computers of material that may or will be perceived to be offensive to others
  • Use of university technology to violate copyright laws
  • Use of phone or computer technology to perpetrate false charges
  • Activities that constitute theft of service (e.g., unauthorized printing)
  • Sending an email using another person’s account without written permission
皇冠体育-皇冠体育博彩官网 博彩app-体育博彩app-体育博彩app推荐 体育博彩平台-体育博彩平台推荐 博彩平台-亚洲博彩网站 太阳城app-澳门太阳城app下载