Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


  1. Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources. 
  2. Attempting to access or accessing another’s account, private files, or –email e–mail without the owner’s permission.
  3. Misrepresenting oneself as another individual in electronic communication. 
  4. Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in ”Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.” 
  5. Using computing resources for commercial or profit-making purposes without written authorization from the University. 
  6. Using computing resources to engage in conduct that interferes with other users’ use of share computer resources and/or the activities of other users. 
  7. Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols. 
  8. Allowing access to computer resources by unauthorized users. 
  9. Using computer resources for illegal activities. 
  10. Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others. 
  11. Non UMES managed network devices (hubs, switches, access points, etc) are not authorized to connect to the UMES network.

Revision History



Revision Date




Original Version





 Major Change



S. Daniels 

1.2Major Change


S. Daniels