A. Computer security breach refers to the act of accessing a University computer or computer network without authority or beyond authorized access and content.
B. The acts that constitute computer security breach include but are not limited to the following:
- Hacking or identity theft, or introducing false information (e.g., using someone else’s account and sending offensive mail, posting malicious remarks, and uploading malicious and sensitive pictures), downloading or extracting confidential and/or sensitive data.
- Altering information (e.g., changing the password of someone else’s account, unauthorized changing data in files, etc.).
- Damaging or destroying information (e.g., deleting someone else’s files, etc.).
- Preventing unauthorized disclosure and/or use of confidential information.
- Downloading and/or installing unauthorized or unlicensed software applications and executing malicious software programs or code, or any software that results in compromising the security of the computer network and its users.
6. Disrupting normal operations (e.g., changing the configuration or CMOS set-up of a personal computer or laptop, introducing computer virus, etc.) of computers or computer networks of the University.
C. Students who commit any of the aforementioned acts shall be charged a major offense under the Student Code of Conduct.