Search for a Policy
Illegal or Unauthorized Use of University Computing Resources
Scope: Employees, Students and Visitors are covered by this policy
Policy
The following prohibited actions apply to faculty, staff, ¾Ã¾ÃÈÈÊÓƵs, and visitors:
- theft or malicious destruction of computing property (including computer hardware, software, account credentials, and/or data) belonging to the University, other corporations, or to any other person;
- unauthorized access to, use of, or control of computing facilities or computer data, including circumvention of computing system safeguards;
- acts involving University Computing Resources that obstruct or disrupt University functions in teaching, research, or administration; and
- use of University property in the performance of illegal or prohibited actions including violation of software copyrights or trade secrets and/or activities conducted for personal financial gain except as provided for by other University policy.
Related Form(s)
Not applicable.
Additional Resources and Procedures
Not applicable.
FAQ
Not applicable.
Policy Administration
Next Review Date
7/1/2025
Responsible Officers
Vice President for Information Technology and Chief Information Officer
Legal Reference
Not Applicable.
Compliance Policy
No
Recent Revision History
Reference ID(s)
- MUPIM 19.3
- OAC 3339-19-03
Reviewers
Vice President for Information Technology and Chief Information Officer