Just because you have the technical ability to do something with our computers or networks, does not mean that such activity is permitted. Examples of these types of unauthorized activities include but are not limited to:
- Obtaining, using, or attempting to use someone else's password.
- Viewing, copying, transferring, modifying or making public the files, printouts or computer processes of another user unless you have their oral or written permission.
- Modifying system files.
- Exploring, compromising, breaching or modifying system security measures.
- Tapping phone or network lines, including running an unauthorized network sniffer.
- Making more copies of licensed software than the license allows.
- Installing copies of unlicensed commercial software on our systems.
- Sending a crippling number of files or email messages across the network.
- Using electronic mail to participate in illegal for-profit chain letters or pyramid schemes.
- Releasing a virus, worm or other program that damages or otherwise harms a system or network.
- Preventing others from accessing services, including monopolizing system processing power.
- Forging messages under someone else's userid, i.e., sending mail that appears to come from someone other than yourself.
- Using University resources for unauthorized purposes including profit-making ventures.
- Breaking into a system, either ours, or using ours to break into another remote system, by taking advantage of security holes.
Physics Computer Services, firstname.lastname@example.org
Last Modified: September 23, 1998