- Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources.
- Attempting to access or accessing another’s account, private files, or –email e–mail without the owner’s permission.
- Misrepresenting oneself as another individual in electronic communication.
- Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in ”Using Software: A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.”
- Using computing resources for commercial or profit-making purposes without written authorization from the University.
- Using computing resources to engage in conduct that interferes with other users’ use of share computer resources and/or the activities of other users.
- Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols.
- Allowing access to computer resources by unauthorized users.
- Using computer resources for illegal activities.
- Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others.
- Non UMES managed network devices (hubs, switches, access points, etc) are not authorized to connect to the UMES network.