Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Formatting for clarity.

...

  1. Using technology resources to threaten or harass others, even as a joke.
  2. Knowingly distributing malware, phishing emails or other malicious communication.
  3. Attempting to gain access to computers or network accessible resources for which I am not authorized.
  4. Hosting for-profit activities using EMU resources (e.g. selling items for personal profit or promoting a personal business--with the exception of advertisements in the eClassifieds system on www.emu.edu).
  5. Using the EMU network or other technology resources for criminal or malicious activities.
  6. My account (Royal username and password) identifies me to EMU systems. I will safeguard my account by:
    1. Not allowing others to use my EMU account; nor will I use someone else's account.
    2. Securing my computer against unauthorized access, including using a password-secured screensaver.
    3. Not leaving my computer unattended without securing it by either logging out from it or using a password-protected screen saver.
    4. Using strong passwords and not writing them in places where others can easily see them.
    5. Treating login pages and requests for my password with skepticism. IS will never ask for your password.

I agree that it is illegal to download or share materials in violation of copyright law; that I will respect all copyright laws and that the following referenced documents define the enforcement processes relating to copyright violation allegations for the EMU campus community.

...