University Policy 52: Responsible Use of Information Technology Resources

Category: Internet Usage Policies School: Western Carolina University Statement Rating: Green Last updated: September 10, 2018

Relevant excerpt

V.  RESPONSIBLE USE VIOLATIONS

  1. Sharing your user credentials with others;
  2. Unauthorized attempts to use, manipulate or otherwise gain access to University information or information technology resources;
  3. Unauthorized use of University information technology resources for personal gain for yourself or others;
  4. Use of University information technology resources to store, display or disseminate unlawful communications of any kind, or to harass, stalk, or threaten others, or in similar ways create an atmosphere which unreasonably interferes with the education or employment experience;
  5. Knowingly affecting the security and stability of University information technology resources, including using a system containing malicious software after becoming aware of it.

Download full policy