Listing generated on 09/22/2017 at 03:11:12.

Keydate: 2017-01-18
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 01/18/2017
Last Changed by: HARRISON, SHELLIE on 12/19/2016
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which
are detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2015-12-14
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 12/14/2015
Last Changed by: HARRISON, SHELLIE on 12/07/2015
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which
are detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2015-11-09
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 11/09/2015
Last Changed by: HARRISON, SHELLIE on 10/12/2015
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which
are detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2013-12-02
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 12/02/2013
Last Changed by: DREWREY, DAVID R on 12/01/2014
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which
are detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2012-12-04
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 12/04/2012
Last Changed by: HARRISON, SHELLIE on 12/04/2012
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students, faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which are
detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2012-11-30
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 11/30/2012
Last Changed by: DREWREY, DAVID R on 09/26/2012
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students, faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which are
detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2012-07-16
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 07/16/2012
Last Changed by: DREWREY, DAVID R on 09/26/2012
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students, faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which are
detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2012-03-02
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 03/02/2012
Last Changed by: HARRISON, SHELLIE on 06/05/2012
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students, faculty,
staff, and other users with respect to the computing and telecommunications
systems offered by the University of Mississippi (UM). This includes desktop
systems, hand-held computers, lab facilities, centralized servers, classroom
technology, the wired and wireless campus networks, cloud-based services, etc.
This policy defines and gives examples of various sorts of activities which are
detrimental to the welfare of the overall community and which are therefore
prohibited. It also describes the process by which violators are identified,
investigated, and disciplined. It should be noted that certain legal activities
are in violation of this policy and are prohibited with respect to University
computing and network systems. This policy is designed to protect the
University community from illegal or damaging actions by individuals, either
knowingly or unknowingly. Inappropriate use exposes the University to risks,
including virus attacks, compromise of network systems and services, and legal
issues. This policy directly addresses copyright issues related to illegal
downloads and peer-to-peer file sharing.


Keydate: 2012-02-07
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 02/07/2012
Last Changed by: DREWREY, DAVID R on 02/23/2012
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2011-07-14
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 07/14/2011
Last Changed by: DREWREY, DAVID R on 01/27/2012
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2011-02-23
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 02/23/2011
Last Changed by: HARRISON, SHELLIE on 04/08/2011
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2010-12-01
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 12/01/2010
Last Changed by: GATES, KATHRYN F on 11/17/2010
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2010-05-28
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 05/28/2010
Last Changed by: GATES, KATHRYN F on 05/28/2010
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2010-05-12
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 05/12/2010
Last Changed by: DREWREY, DAVID R on 05/05/2010
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2010-04-21
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 04/21/2010
Last Changed by: DREWREY, DAVID R on 05/05/2010
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, etc.
This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues. This policy
directly addresses copyright issues related to illegal downloads and peer to
peer file sharing.


Keydate: 2009-03-26
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 03/26/2009
Last Changed by: HARRISON, SHELLIE on 03/16/2009
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, dial-
in services, etc. This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues.


Keydate: 2007-03-21
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 03/21/2007
Last Changed by: HARRISON, SHELLIE on 09/08/2008
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, dial-
in services, etc. This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues.


Keydate: 2006-03-13
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 03/13/2006
Last Changed by: GATES, KATHRYN F on 03/16/2007
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the wired and wireless campus networks, dial-
in services, etc. This policy attempts to define and give examples of various
sorts of activities which are detrimental to the welfare of the overall
community and which are therefore prohibited. It also describes the process
by which violators are identified, investigated, and disciplined. It should
be noted that some activities which are legal are in violation of this policy
and are prohibited with respect to University computing and network systems.
This policy is designed to protect the University community from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Inappropriate use exposes the University to risks including virus attacks,
compromise of network systems and services, and legal issues.


Keydate: 2005-03-10
Policy Name: IT Appropriate Use
Policy Code: ACA.IT.100.010
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 03/10/2005
Last Changed by: GATES, KATHRYN F on 03/22/2005
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the campus network, dial-in services, etc. This
policy attempts to define and give examples of various sorts of activities
which are detrimental to the welfare of the overall community and which are
therefore prohibited. It also describes the process by which violators are
identified, investigated, and disciplined. It should be noted that some
activities which are legal are in violation of this policy and are prohibited
with respect to University computing and network systems. This policy is
designed to protect the University community from illegal or damaging actions
by individuals, either knowingly or unknowingly. Inappropriate use exposes the
University to risks including virus attacks, compromise of network systems and
services, and legal issues.


Keydate: 2005-01-01
Policy Name: IT Appropriate Use Policy
Policy Code: ACA.IT.100.001
Status: Approved and Activated
Administrative Division: PROVOST/VC FOR ACADEMIC AFFAIRS
Responsible Office: INFORMATION TECHNOLOGY
Effective Date: 03/09/2005
Last Changed by: GATES, KATHRYN F on 03/10/2005
Policy Narrative: PDF File

Policy Summary/Purpose:
This policy sets forth the privileges of and restrictions on students,
faculty, staff, and other users with respect to the computing and
telecommunications systems located at the University of Mississippi. This
includes desktop systems, hand-held computers, lab facilities, centralized
servers, classroom technology, the campus network, dial-in services, etc. This
policy attempts to define and give examples of various sorts of activities
which are detrimental to the welfare of the overall community and which are
therefore prohibited. It also describes the process by which violators are
identified, investigated, and disciplined. It should be noted that some
activities which are legal are in violation of this policy and are prohibited
with respect to University computing and network systems. This policy is
designed to protect the University community from illegal or damaging actions
by individuals, either knowingly or unknowingly. Inappropriate use exposes the
University to risks including virus attacks, compromise of network systems and
services, and legal issues.