32 Nova Southeastern University Student Handbook 5. to recklessly, willfully, negligently, or maliciously interfere with or damage NSU computer or network resources or computer data, files, or other information Examples (not a comprehensive list) of policy violations related to the above five categories include • using information technology resources to invade the privacy of another user/individual • sending an individual or group repeated and unwanted (harassing) email or using email to threaten someone • accessing, or attempting to access, another individual’s data or information without proper authorization (e.g., using another’s computing account and password to look at personal information) • creating a false email address • propagating electronic mail chain, pyramid schemes, or sending forged or falsified email • obtaining, possessing, using, or attempting to use someone else’s password regardless of how the password was obtained • copying a graphical image from a website without permission • posting a university site-licensed program to a public bulletin board • using illegally obtained licensed data/software, or using licensed data/software in violation of their licenses or purchase agreements • releasing or threatening to release a virus, worm, or other program that damages or otherwise harms a system, network, or data • preventing others from accessing services • attempting to tamper with or obstruct the operation of NSU’s computer systems or networks • using or attempting to use NSU’s computer systems or networks as a means for the unauthorized access to computer systems, networks, or data outside the university • improper peer-to-peer file sharing • viewing, distributing, downloading, posting, or transporting child or any pornography via the web, including sexually explicit material for personal use that is not required for educational purposes • using university resources for unauthorized purposes (e.g., using personal computers connected to the campus network to set up web servers for illegal, commercial, or profit-making purposes) • violating federal copyright, intellectual property, and/or trademark laws or the NSU copyright, intellectual property, and/or policy Inappropriate conduct and violations of this policy will be addressed by the appropriate procedures and agents (e.g., the Office of the Vice President for Academic Affairs or the Office of Human Resources) depending on the individual’s affiliation to the university. In cases where a user violates any of the terms of this policy, the university may, in addition to other remedies, temporarily or permanently deny access to any and all NSU information technology resources, and appropriate disciplinary actions may be taken, up to, and including, dismissal.
RkJQdWJsaXNoZXIy NDE4MDg=