Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources. 
  2. Attempting to access or accessing another’s account, private files, or –email without the owner’s permission.
  3. Misrepresenting oneself as another individual in electronic communication. 
  4. Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in ”Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.” 
  5. Using computing resources for commercial or profit-making purposes without written authorization from the University. 
  6. Using computing resources to engage in conduct that interferes with other users’ use of share computer resources and/or the activities of other users. 
  7. Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols. 
  8. Allowing access to computer resources by unauthorized users. 
  9. Using computer resources for illegal activities. 
  10. Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others. 
  11. Attaching more than one computer to their data jack. Multiple machines or hubs are not permitted.

Users of the University’s data network must read, agree to, and sign this agreement stating that they have read and will abide by University policies set forth in the University’s Guidelines for the Acceptable Use of Computing Resources before they are permitted to use UMES Computing Resources. 

 

Revision History

Version

Description

Revision Date

Review
Date

Reviewer/Approver
Name

1.0

Original Version

 

 

 

 1.1

 Major Change

  

  

S. Daniels 

1.2Major Change

 

 S. Daniels