13.11.2014 Views

Victory University 2012-2013 Academic Catalog

Victory University 2012-2013 Academic Catalog

Victory University 2012-2013 Academic Catalog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Breach of Security<br />

This is any attempt to circumvent the protection of unauthorized access of computing<br />

resources put in place by the <strong>University</strong> or any action that reduces the security of the<br />

<strong>University</strong>’s computing and network resources. Examples are:<br />

• Leaving computers logged on for others to use<br />

• Logging on or attempting to log on to a computer or computer account without proper<br />

authorization<br />

• Connecting or attempting to connect a network analyzer device to the <strong>University</strong>’s<br />

computing resources<br />

• Sharing passwords with others; this includes faculty, supervisors or IT personnel.<br />

Passwords should never be revealed.<br />

Users should recognize that <strong>Victory</strong>’s computing resources, including electronic mail, are not<br />

secure or private. Users should not use the <strong>University</strong>’s computing resources to store or<br />

transmit sensitive information or data.<br />

Failure to comply with the Computer Use Policy, Regulations and Guidelines of the <strong>University</strong> as<br />

outlined in the student handbook, academic catalog, employee handbook, and/or other policies<br />

governing academic, student life, or personnel matters at the <strong>University</strong> will result in<br />

appropriate disciplinary action up to, and including, termination/expulsion.<br />

REMEDIAL ACTION AND RIGHT OF PRIVACY<br />

Instances of computer abuse will be referred to the appropriate officials for disciplinary action.<br />

In addition, perpetrators of computer abuse may be subject to state and federal laws regarding<br />

computer abuse. The <strong>University</strong> reserves the right to terminate or restrict any user’s access to<br />

the <strong>University</strong>’s computer resources in response to instances of abuse. These restrictions could<br />

include the temporary or permanent loss of e‐mail/Internet privileges; loss of network access;<br />

and/or administrative discipline, termination, expulsion or criminal prosecution where<br />

appropriate. Use of the <strong>University</strong>’s computing resources to commit acts of cheating or<br />

plagiarism by reading or copying other’s programs or files will be dealt with in accordance with<br />

the <strong>University</strong>’s policies on cheating and plagiarism.<br />

Technical authority for the <strong>University</strong>’s computing resources rests with the Director of<br />

Information Systems who, upon detection or learning of an alleged violation, will turn all<br />

pertinent information over to the appropriate <strong>University</strong> officials. Any illegal activity will be<br />

reported immediately to the appropriate <strong>University</strong> officials.<br />

54

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!