CHCS Student Handbook 2018-2019

Nova Southeastern University Student Handbook 23 Policy violations generally fall into five categories that involve the use of computing resources: 1. for purposes other than the university’s programs of instruction and research and the legitimate business of the university 2. to harass, threaten, discriminate, stalk, intimidate, or otherwise cause harm or attempt to cause harm to specific individuals or classes of individuals 3. to impede, interfere with, impair, or otherwise cause harm to the activities of others 4. to download, post or install to university computers, or transport across university networks, material that is illegal, proprietary, in violation of license agreements, in violation of copyrights, in violation of university contracts, or otherwise damaging to the institution 5. to recklessly, willfully, negligently, or maliciously interfere with or damage NSU computer or network resources or computer data, files, or other information Examples (not a comprehensive list) of policy violations related to the above five categories include: • using computer resources for personal reasons • using computer resources to invade the privacy of another • sending email on matters not concerning the legitimate business of the university • sending an individual or group repeated and unwanted (harassing) email or using email to threaten someone • accessing, or attempting to access, another individual’s data or information without proper authorization (e.g. using another’s computing account and password to look at personal information) • creating a false email address • propagating electronic mail chain, pyramid schemes, or sending forged or falsified email • obtaining, possessing, using, or attempting to use someone else’s password regardless of how the password was obtained • copying a graphical image from a website without permission • posting a university site-licensed program to a public bulletin board • using illegally obtained licensed data/software, or using licensed data/software in violation of their licenses or purchase agreements • releasing or threatening to release a virus, worm, or other program that damages or otherwise harms a system, network, or data • preventing others from accessing services • attempting to tamper with or obstruct the operation of NSU’s computer systems or networks • using or attempting to use NSU’s computer systems or networks as a means for the unauthorized access to computer systems, networks, or data outside the university

RkJQdWJsaXNoZXIy NDE4MDg=