Computer and Internet access have an increasingly important role in today’s education and business environments. The intent of the following policy is to allow the greatest use of UTI’s computer facilities in a manner consistent with an appropriate professional environment and with the mission of UTI.
Computer Violation Examples:
- Intentionally introducing damaging software, such as viruses.
- Accessing internet sites or services that are inappropriate for a particular curriculum or the educational environment. This includes but is not limited to any information containing obscene, indecent, or sexually explicit material or containing profane language.
- Intentionally damaging hardware.
- Attempting to access any computing resources to which a student is not entitled or authorized.
- Violating the privacy of others’ computer information (either files or e-mail).
- Harassing others or sending threatening, inappropriate or falsified e-mail, direct, or text messages.
- Violating password security.
- Violating copyright or license requirements, which include, but is not limited to, the improper/illegal downloading of material to school owned and/or personal electronic devices.
- Allowing computer access to any individual not an UTI student, graduate, or employee.
- Conducting any profit making or commercial activity from UTI computer facilities.
- Violating any computer security rules, regulations or laws as follows:
- UTI’s Electronic Use and Computer Information Technology Policies
- Applicable State Laws and Regulations
- Federal Copyright Law
- Computer Fraud and Abuse Act of 1986
- Electronic Communication Privacy Act of 1986
- Computer Software Rental Amendments Act of 1990