KPCOM Student Handbook 2024-2025

30 Nova Southeastern University Student Handbook Among the more important laws are the Florida Computer Crimes Act, the Federal Computer Abuse Amendment Act 1994, the Federal Electronic Communications Privacy Act, and the U.S. Copyright Act. Copies of these laws and the NSU copyright policy may be examined in the Office of Academic Affairs. Unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject the student to civil and criminal liabilities. Policy violations generally fall into five categories that involve the use of information technology resources, including 1. f or purposes other than the university’s programs of instruction and research and the legitimate business of the university 2. to harass, threaten, discriminate, stalk, intimidate, or otherwise cause harm or attempt to cause harm to specific individuals or classes of individuals 3. to impede, interfere with, impair, or otherwise cause harm to the activities of others 4. t o download, post, or install to university computers, or transport across university networks, material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of university contracts, or otherwise damaging to the institution 5. to recklessly, willfully, negligently, or maliciously interfere with or damage NSU computer or network resources or computer data, files, or other information Examples (not a comprehensive list) of policy violations related to the above five categories include • using information technology resources to invade the privacy of another user/individual • sending an individual or group repeated and unwanted (harassing) email or using email to threaten someone • accessing, or attempting to access, another individual’s data or information without proper authorization (e.g., using another’s computing account and password to look at personal information) • creating a false email address • propagating electronic mail chain, pyramid schemes, or sending forged or falsified email • obtaining, possessing, using, or attempting to use someone else’s password regardless of how the password was obtained • copying a graphical image from a website without permission • posting a university site-licensed program to a public bulletin board • using illegally obtained licensed data/software, or using licensed data/software in violation of their licenses or purchase agreements • releasing or threatening to release a virus, worm, or other program that damages or otherwise harms a system, network, or data • preventing others from accessing services • attempting to tamper with or obstruct the operation of NSU’s computer systems or networks

RkJQdWJsaXNoZXIy NDE4MDg=