Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

ARCC resources may only be used for activities authorized by the University and are always subject to Unireg 8-1. Prohibited actions include, but are not limited to, the following:

1.1.4.1 Unauthorized Access

...

Attempting to send or receive messages or access information by unauthorized means, such as imitating another system, impersonating another user or other person, misusing legal user credentials (usernames, passwords, etc.), or causing some system component to function incorrectly

1.1.4.2 Altering Authorized Access

...

Changing or circumventing access controls to allow the user or others to perform actions outside authorized privileges

1.1.4.3 Reconstruction of Information or Software

...

Reconstructing or re-creating information or software outside authorized privileges

1.1.4.4 Data Modification or Destruction

...

Taking actions that intentionally modify or delete information or programs outside authorized privileges

1.1.4.5 Malicious Software

...

Intentionally introducing or using malicious software, including, but not limited to, computer viruses, Trojan horses, or worms

1.1.4.6 Denial of Service Actions

...

Using UW/ARCC resources to interfere with any service availability, either at UW or at other sites

1.1.4.7 Pornography

...

Using UW/ARCC resources to access, upload, download, store, transmit, create, or otherwise use sexually explicit or pornographic material

1.1.4.8 Harassment

...

Engaging in an offensive or harassing actions toward another individual or organization

1.2 Software, Data, Security and Access Control

ARCC Use by Foreign Nationals

...