From the University’s “Responsible Computing” policy
The following statement must be affirmed by all account holders prior to their receiving their accounts:
Customers are granted access to computing, networks, and information stored electronically contingent upon their prudent and responsible use. Access is granted to the individual and no individual can transfer or share access with another. Customers may not (1) use information or resources for any illegal or unauthorized purpose or act, i.e., to violate state or federal laws or any established policies and procedures of the University; (2) participate in any behavior that unreasonably interferes with the fair use of other customers or harms them in any way; (3) use resources or information for commercial purpose without prior authorization from the Vice President for Administration and Finance. Misuse of computing, networking, and information resources may result in severe consequences, including the loss of access to computing resources. Realize that this loss of access could adversely affect the fulfillment of your University obligations.
Customers are likewise granted access to telecommunication resources contingent upon their prudent and responsible use. Customers may not (1) utilize these resources for any illegal or unauthorized purpose or act, i.e., to violate state or federal laws or any established policies and procedures of the University; (2) participate in any behavior that interferes with the fair use of such resources or harms others in any way; (3) use resources or information for commercial purpose without the prior authorization of the Vice President for Administration and Finance. Misuse of telecommunication resources may result in severe consequences.
By signing below, I acknowledge understanding of the information contained above and offer consent to the following: (1) in any investigation of misuse, the University may inspect, without prior notice, the contents of files, voice mail, logs, and any related computer-generated or stored material, such as printouts; and (2) customer computer files may be inspected occasionally by systems personnel when assuring system integrity or performing related resource management duties. I also consent to comply with the University’s Policies and Procedures regarding computing and telecommunication resources.
This agreement applies to all current and future accounts and access to University resources.
According to state policy, users may not utilize sites provided by the university for their own commercial interests unless special permission is obtained. This policy includes the advertisement of products, services, and events.