- Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources.
- Attempting to access or accessing another’s account, private files, or –email without the owner’s permission.
- Misrepresenting oneself as another individual in electronic communication.
- Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in ”Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.”
- Using computing resources for commercial or profit-making purposes without written authorization from the University.
- Using computing resources to engage in conduct that interferes with other users’ use of share computer resources and/or the activities of other users.
- Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols.
- Allowing access to computer resources by unauthorized users.
- Using computer resources for illegal activities.
- Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others.
- Attaching more than one computer to their data jack. Multiple machines or hubs are not permitted.
Users of the University’s data network must read, agree to, and sign this agreement stating that they have read and will abide by University policies set forth in the University’s Guidelines for the Acceptable Use of Computing Resources before they are permitted to use UMES Computing Resources.