Illegal or Unauthorized Use of University Computing Resources

Scope:  Who is Covered by this Policy?

  • Employees, Students and Visitors


The following prohibited actions apply to faculty, staff, students, and visitors:

  1. theft or malicious destruction of computing property (including computer hardware, software, account credentials, and/or data)  belonging to the University, other corporations, or to any other person;
  2. unauthorized access to, use of, or control of computing facilities or computer data, including circumvention of computing system safeguards;
  3. acts involving University Computing Resources that obstruct or disrupt University functions in teaching, research, or administration; and
  4. use of University property in the performance of illegal or prohibited actions including violation of software copyrights or trade secrets and/or activities conducted for personal financial gain except as provided for by other University policy.

Related Form(s)

Not applicable.

Additional Resources and Procedures

Not applicable.


Not applicable.

Policy Administration

Next Review Date


Responsible Officers

Vice President for Information Technology & Chief Information Officer

Legal Reference

Not Applicable.

Compliance Policy


Recent Revision History


Reference ID(s)

  • MUPIM 19.3
  • OAC 3339-19-03


Vice President for Information Technology & Chief Information Officer