This University Policy is revised to add two new sections: “Authorization” and “Appropriate Uses,” in addition to adding a list of activities that constitute violations of the policy. The new section on Authorization sets forth the function of the user ID and password. The section on Appropriate Uses provides a list of examples of uses of computing and network resources that the University encourages. The Policy provides specific examples of policy violations to assist users in identifying inappropriate uses.
Effective Date
September 27, 2002