User Security Violations

User violations include, but are not limited to:

  1. Interfering with the operation of anti-virus/malware detection software installed by the IT Division.
  2. Generating malicious or illegal traffic, or attempting to gain access to sensitive or personal data belonging to Central Texas College District or other entities.
  3. Engaging in any activity that is illegal under local, state, or federal law or laws of the applicable host country while utilizing Central Texas College District owned or leased resources.
  4. Examining, copying, modifying, or deleting files and/or data belonging to other users without their prior consent.
  5. Using Central Texas College District computer systems and/or networks to gain unauthorized access to remote systems.
  6. Making any intentional attempts to obtain unauthorized access to or otherwise interfere with the operation of network systems or programs.
  7. Willfully introducing computer malware into the Central Texas College District network.
  8. Intentionally operating any network-intensive application that overloads the network.
  9. Executing port scans, security scans, or any form of network monitoring which will intercept data not intended for you.
  10. Forging or attempting to forge electronic mail messages or header information.
  11. Attempting to read, delete, copy, or modify the electronic mail of other users.
  12. Sending or attempting to send harassing, obscene, or other threatening e-mail to another user.
  13. Making illegal copies of software licensed to Central Texas College District.
  14. Using Central Texas College District-owned computer accounts, computer and communications equipment, software, or networks for commercial purposes.
  15. Using software and hardware provided by Central Texas College District for work outside the teaching, learning, and professional mission of Central Texas College District.
  16. Modifying configuration options or installing additional software that may cause increased security vulnerabilities. For example, installing software or devices to allow remote access to a Central Texas College District-owned computer in such a way that would bypass existing security measures.
  17. Encroaching on others’ use of shared computing resources. Such encroachment shall include, but is not limited to, creating a disturbance, displaying or disseminating offensive material, or otherwise interfering with others’ use of shared computing resources.
  18. Connecting any wireless access devices to the campus network without prior approval from Information Technology.
  19. Attempting to decrypt system or user passwords or other encrypted information.
  20. Attempting to secure a higher level of privilege on network systems, or attempting to subvert the restrictions associated with your use of accounts and/or software.