What are other examples of violations of the Policy Regarding Abuse of CIT Computers and Networks?
Many commonplace Internet behaviors are violations under this policy and could be “actionable” under the Campus Code of Conduct. It’s worth your while to read the entire policy. Here’s a sampling of policy violations in addition to the ones already cited: • unauthorized use of university information technology resources and unauthorized access to data or files — even if they aren’t securely protected, and no matter how you got access to another person’s NetID and password; • accessing or attempting to access another individual’s data or information without proper authorization — e.g., using another’s NetID and password to look at that individual’s personal information; • use of university resources for unauthorized purposes — which includes your own computer when it is connected to the Cornell Campus Network — such as illegal, commercial, or profit-making activities • releasing a virus or other program that damages or otherwise harms a system or network; • sending a crippling numbe