User Security Violations
User violations include, but are not limited to:
- Interfering with the operation of anti-virus/malware detection software installed by the IT Division.
- Generating malicious or illegal traffic, or attempting to gain access to sensitive or personal data belonging to Central Texas College District or other entities.
- Engaging in any activity that is illegal under local, state, or federal law or laws of the applicable host country while utilizing Central Texas College District owned or leased resources.
- Examining, copying, modifying, or deleting files and/or data belonging to other users without their prior consent.
- Using Central Texas College District computer systems and/or networks to gain unauthorized access to remote systems.
- Making any intentional attempts to obtain unauthorized access to or otherwise interfere with the operation of network systems or programs.
- Willfully introducing computer malware into the Central Texas College District network.
- Intentionally operating any network-intensive application that overloads the network.
- Executing port scans, security scans, or any form of network monitoring which will intercept data not intended for you.
- Forging or attempting to forge electronic mail messages or header information.
- Attempting to read, delete, copy, or modify the electronic mail of other users.
- Sending or attempting to send harassing, obscene, or other threatening e-mail to another user.
- Making illegal copies of software licensed to Central Texas College District.
- Using Central Texas College District-owned computer accounts, computer and communications equipment, software, or networks for commercial purposes.
- Using software and hardware provided by Central Texas College District for work outside the teaching, learning, and professional mission of Central Texas College District.
- Modifying configuration options or installing additional software that may cause increased security vulnerabilities. For example, installing software or devices to allow remote access to a Central Texas College District-owned computer in such a way that would bypass existing security measures.
- Encroaching on others’ use of shared computing resources. Such encroachment shall include, but is not limited to, creating a disturbance, displaying or disseminating offensive material, or otherwise interfering with others’ use of shared computing resources.
- Connecting any wireless access devices to the campus network without prior approval from Information Technology.
- Attempting to decrypt system or user passwords or other encrypted information.
- Attempting to secure a higher level of privilege on network systems, or attempting to subvert the restrictions associated with your use of accounts and/or software.