Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Use any account managed by USF-IT or other USF department other than my own
  • Allow another person to access my account
  • Share my password(s)
  • Use computing resources for private profit and/or for promoting a religious or political group
  • Intentionally impede the legitimate use of computing resources or facilities by others
  • Use resources or facilities, including printers, for junk mail, mass mailing, or non-course related work
  • Use computers to access pornographic material

Individuals using this system without using USF accounts and/or USF computing resources without authority or in excess of their authority are subject to having all of their activities on this system on their USF account and/or USF computing resource monitored and recorded by system personnel. While monitoring individuals improperly using this system accounts/resources or during system maintenance, the activities of authorized users may be examined. Anyone using this system using USF accounts/computing resources agrees to such examination and is advised that if it reveals possible evidence of criminal activity, system  USF accounts/computing resources personnel may provide this evidence to law enforcement officials.

...