Hodges Student Handbook

refer to the Academic Honesty Policy in this Handbook. • Facilitating unauthorized access to anyone’s personally identifiable information as defined by Florida Statute. System Abuse All students are responsible for their own actions. If an accident occurs, please immediately notify the Office of Information Technology department. Damage will be evaluated, if any. If negligence was involved in the loss or if extensive repair is needed to computer equipment, the student responsible may be required to pay for damages and/or be prohibited from further access to University resources and systems. Deliberate attempts, such as denial of service attacks, intended to degrade the performance of a system or network, to deprive authorized personnel or other constituents of resources or access to any University technology resource, or to gain unauthorized access to resources are prohibited. Harassment University policies related to any form of harassment apply to the use of technology resources. Abusive behaviors are not permitted. Abusive behaviors include the utilization of resources to harass others in some way. An example would be sending electronic messages that are abusive, obscene, threatening, or a nuisance to the receiving party. Obscene, vulgar, or derogatory output prominently displayed on a public workstation or printed and left out in public areas is prohibited. Students of Hodges University are forbidden to use University technology resources to view, save, print, send or any function involving lewd, pornographic, obscene or vulgar material of any kind. Complaints of behavior that appears to constitute misuse of resources will result in an investigation by University officials, and appropriate action will be initiated. Behavior involving pornography may result in disciplinary action up to and including immediate dismissal from the University.

• Personal financial gain or other unauthorized commercial enterprise. • Forwarding e-mail chain letters, phishing, virus, spyware or other harmful content. • Spamming, spoofing, or illegally accessing resources using University e-mail accounts or equipment. • Sharing material protected under copyright laws. • Facilitating unauthorized access to any University resource. • Accessing, copying, alteration, or destruction of another user’s personal files without explicit permission, authorization or if required to do so by law, warrant or regulation. Simply being able to access a file or other information does not imply permission. • Storing passwords or other information that can be used to gain access to campus resources in plain sight. Such information should be stored in a secure environment. Login accounts, passwords, and other types of authorization are assigned to individual users and must not be shared with others. Students are responsible for any unauthorized use of their accounts. Please refer to the Password Policy in this Handbook. • The use of technology resources for purposes that involve academic dishonesty is a violation of University policy. Please

38

Hodges University Student Handbook 

Made with FlippingBook Ebook Creator