13.11.2014 Views

Victory University 2012-2013 Academic Catalog

Victory University 2012-2013 Academic Catalog

Victory University 2012-2013 Academic Catalog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Downloading or attempting to download any software not authorized by the IT<br />

Department of <strong>Victory</strong> <strong>University</strong><br />

• Performing or attempting to perform maintenance or modification to any computer or<br />

network resources, hardware or software, without prior approval of the IT Department<br />

• Defeating or attempting to defeat any of the <strong>University</strong> system’s security; for example,<br />

by hacking or guessing user identifications or passwords. Also includes logging in as<br />

other users for any purpose after finding out their passwords.<br />

• Allowing other users to log in under your own assigned username. This includes<br />

leaving your computer logged in for the express purpose of others being allowed to use<br />

your computer.<br />

• Modification of data or equipment, including but not limited to destruction of<br />

equipment, alteration of data, reconfiguration of control switches or parameters, or<br />

changes in software or firmware without specific authorization from the <strong>University</strong>’s IT<br />

Department<br />

Illegal or Unethical Use<br />

This is any use of the <strong>University</strong>’s computing resources in the commission of an illegal act.<br />

Examples include:<br />

• Sharing or requesting passwords among co‐workers<br />

• Violation of licensing agreements including the illegal copying of software, data, and<br />

files on or off campus<br />

• Attempting to break into a computer or network<br />

• Sending harassing or threatening electronic mail<br />

• Using the <strong>University</strong>’s computing resources for plagiarism, transmission of test<br />

questions or other forms of cheating<br />

• Fraudulent use of computer accounts, networks, mail services or other resources<br />

• Unauthorized access and interference with the <strong>University</strong>’s computer systems,<br />

computer data, and other computer users<br />

• Using the <strong>University</strong>’s computer resources for promoting outside business interests<br />

• Using the e‐mail system for the promotion of any political candidate or party/special<br />

interest group<br />

• Using the <strong>University</strong>’s computer resources for the purpose of gambling<br />

• Using the <strong>University</strong>’s computer resources to gain illegal access to other organization’s<br />

computer networks (hacking)<br />

• Deleting data on a <strong>Victory</strong> <strong>University</strong> owned and/or administered computer, network<br />

server, or other resource.<br />

53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!