Hodges Student Handbook

RESPONSIBILITY PRIVILEGE HONOR TRUST

STUDENT IDENTIFICATION POLICY

Responsibilities Access to University resources is a privilege provided in order to conduct the academic functions of the University. However, it must be understood that privileges are conditioned upon acceptance of the accompanying responsibilities. Authorized users must: • Honor acceptable use and other University policies. • Abide by existing federal, state, and local privacy, telecommunications, networking, and other applicable laws and regulations. • Abide by copyright laws. • Minimize unnecessary network traffic (i.e. streaming media) that may overload networks, waste resources and interfere with the ability of others to make effective use of network resources. • Refrain from malicious or unauthorized transmissions or monitoring.

• Similarly, students should not connect to a remote computer on the network without prior written permission from the administrator of that system unless given legally justifiable cause to do so. Unauthorized Access Unauthorized access to resources is prohibited. In particular, users are not permitted to engage in activities that are detrimental to the system or other users. These include, but are not limited to: damaging computer systems, obtaining unauthorized access to resources, depriving another user of authorized resources, and gaining unauthorized access to systems. Examples of prohibited means of obtaining unauthorized access include, but are not limited to: hacking, the use of key loggers or other software designed to capture secure information, using privileges granted during a previous position at the University, unauthorized physical access and any other unauthorized access to electronic files. The use

39 

Hodges University Student Handbook

Made with FlippingBook Ebook Creator