...
- Use any account managed by USF-IT or other USF department other than my own
- Allow another person to access my account
- Share my password(s)
- Use computing resources for private profit and/or for promoting a religious or political group
- Intentionally impede the legitimate use of computing resources or facilities by others
- Use resources or facilities, including printers, for junk mail, mass mailing, or non-course related work
- Use computers to access pornographic material
Individuals using this system without using USF accounts and/or USF computing resources without authority or in excess of their authority are subject to having all of their activities on this system on their USF account and/or USF computing resource monitored and recorded by system personnel. While monitoring individuals improperly using this system accounts/resources or during system maintenance, the activities of authorized users may be examined. Anyone using this system using USF accounts/computing resources agrees to such examination and is advised that if it reveals possible evidence of criminal activity, system USF accounts/computing resources personnel may provide this evidence to law enforcement officials.
...