Illegal or Unauthorized Use of University Computing Resources


Scope:  Who is Covered by this Policy?

  • Employees, Students and Visitors

Policy 

The following prohibited actions apply to faculty, staff, students, and visitors:

  1. theft or malicious destruction of computing property (including computer hardware, software, account credentials, and/or data)  belonging to the University, other corporations, or to any other person;
  2. unauthorized access to, use of, or control of computing facilities or computer data, including circumvention of computing system safeguards;
  3. acts involving University Computing Resources that obstruct or disrupt University functions in teaching, research, or administration; and
  4. use of University property in the performance of illegal or prohibited actions including violation of software copyrights or trade secrets and/or activities conducted for personal financial gain except as provided for by other University policy.

Related Form(s)

Not applicable.


Additional Resources and Procedures

Not applicable.


FAQ

Not applicable.

Policy Administration

Next Review Date

7/1/2023

Responsible Officers

Vice President for Information Technology & Chief Information Officer

Legal Authority

Not Applicable.

Compliance Policy

No

Recent Revision History

 

Reference ID(s)

  • MUPIM 19.3
  • OAC 3339-19-03

Governance Authority

Vice President for Information Technology & Chief Information Officer