KPCOM Student Handbook 2024-2025

32 Nova Southeastern University Student Handbook 4. t o download, post, or install to university computers, or transport across university networks, material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of university contracts, or otherwise damaging to the institution 5. to recklessly, willfully, negligently, or maliciously interfere with or damage NSU computer or network resources or computer data, files, or other information Examples (not a comprehensive list) of policy violations related to the above five categories include • using information technology resources to invade the privacy of another user/individual • sending an individual or group repeated and unwanted (harassing) email or using email to threaten someone • accessing, or attempting to access, another individual’s data or information without proper authorization (e.g., using another’s computing account and password to look at personal information) • creating a false email address • propagating electronic mail chain, pyramid schemes, or sending forged or falsified email • obtaining, possessing, using, or attempting to use someone else’s password regardless of how the password was obtained • copying a graphical image from a website without permission • posting a university site-licensed program to a public bulletin board • using illegally obtained licensed data/software, or using licensed data/software in violation of their licenses or purchase agreements • releasing or threatening to release a virus, worm, or other program that damages or otherwise harms a system, network, or data • preventing others from accessing services • attempting to tamper with or obstruct the operation of NSU’s computer systems or networks • using or attempting to use NSU’s computer systems or networks as a means for the unauthorized access to computer systems, networks, or data outside the university • improper peer-to-peer file sharing • viewing, distributing, downloading, posting, or transporting child or any pornography via the web, including sexually explicit material for personal use that is not required for educational purposes • using university resources for unauthorized purposes (e.g., using personal computers connected to the campus network to set up web servers for illegal, commercial, or profit-making purposes) • violating federal copyright, intellectual property, and/or trademark laws or the NSU copyright, intellectual property, and/or policy

RkJQdWJsaXNoZXIy NDE4MDg=