3.1. Authorized users may access University IT resources for occasional, inconsequential personal uses, with no expectation of privacy, if the following conditions are met:
3.1.1. The use does not disrupt, negatively impact, or interfere with the security, functions, availability or performance of University IT resources (such uses including, but not limited to, network overload, spam email, or excessive, simultaneous video streams).
3.1.6. The use does not otherwise violate University policies, regulations or rules, or state or federal law.