Am I allowed to experiment with security-related software tools using Penn State networking resources?
Unless you have the express written consent of the Director of ITS Security Operations and Services, you are prohibited from conducting or attempting to conduct security experiments, security scans, or the use of security-related software tools. (Policy AD20 Computer and Network Security – Policy => II. Responsibilities Related To Access To And Use Of Computer And Network Resources => System Users => f.). If done either purposefully or accidentally, the violation of any University Policies will result in a referral to OJA or OHR.