-
Unauthorized copying of licensed materials or items protected by copyright. This includes, but is not limited to:
- Software (Including operating systems, programs, applications, databases, or code.)
- Multimedia files (Including music, movies, or audio.)
- Text files
-
Computer hacking is the unwanted or unsolicited entry into a computer system. This includes, but is not limited to:
- Successful and unsuccessful acts of hacking.
- Possession of the tools used for computer hacking.
- Running programs that attempt to identify passwords or codes.
-
Knowingly introduce a computer virus to a computer or network. A computer virus is considered to be a program, either harmless or damaging, that attaches itself to another program and/or has the capability to reproduce in order to infect other computers.
-
Gain or attempt to gain unauthorized access to private or protected information. This includes, but is not limited to:
- Willful damage or misuse of systems, applications, databases, code, or data.
- Attempts to gain network privileges which you are not entitled.
-
Unauthorized alteration of system configuration. This includes, but is not limited to interrupting or attempting to interrupt programs that protect data or secure systems.
-
Introduce or use profanity or obscenities on Hawkeye's network, Internet, or any other communications configuration accessible by or connected to Hawkeye's computers or computer systems.
-
Use Hawkeye's network to:
- Conduct business.
- Solicit services.
- Develop, introduce, or circulate inflammatory comments or subjects.
-
Share assigned logins with anyone, for any reason. Each student and employee is responsible for all activities under their assigned login. This includes, but is not limited to:
- Unauthorized use or attempted use of another person’s login.
- Unauthorized use of a generic login outside of the context for which it was created.
-
Inappropriate or misuse of email. This includes sending unsolicited email including junk mail, jokes, or chain letters to anyone from Hawkeye's system that is not of a business nature.
-
Install unauthorized personal hardware to any computer or network resource.
-
Install any software on Hawkeye's network. Software installations are the responsibility of Hawkeye's Communication and Information Systems department.
-
Unauthorized entry into a file to use, read, or change the contents, or for any other purpose.
-
Unauthorized transfer of a file.
-
Use computer facilities to interfere with the work of another student, instructor, or Hawkeye official.
-
Use computer facilities to send, print, or display obscene or abusive messages or materials.
-
Use computer facilities to interfere with normal operation of Hawkeye’s computer system.
- Inappropriate or misuse of printing resources. This includes, but is not limited to:
- Printing of profanity or obscenities.
- Printing items not directly associated with class materials.