University Technology and Network Violations


The following are considered violations of Maryville University Technology and Network Use. Individuals found participating in these activities are subject to loss of all network privileges and other University disciplinary action.

• Attempting to defeat the network, servers, or administrative computer’s security systems, mechanisms, or controls.
• Disguising one’s identity in any way, including the sending of falsified messages, removal of data from system files, masking of process names, masking or spoofing of MAC or IP addresses or using any other unauthorized IP address.
• Launching or participating in a denial of service attack or any other action with the intent of damaging or disrupting any network, system, or device on or outside of the Maryville network.
• Possessing, using, or developing password cracking programs or algorithms on or against any device or server within or outside of the Maryville network.
• Unauthorized use of another individual’s identification and/or password.
• Using or obtaining another user’s electronic identification. Electronic identification includes, but is not limited to: voicemail passwords, telephone dialing codes, login ID, password, MAC address, IP address, e-mail address, or ID Card.
• Any action intended to disrupt normal system services or which adversely affects other users’ accounts, electronic material, e-mail, or network performance.
• Obtaining, copying, or distributing copyrighted software without the expressed written consent of the copyright holder.
• Accessing or attempting to access another users’ data without their permission.
• Using another person’s computer without their knowledge to accomplish any action that is in violation of the Maryville University Computer User Code of Conduct.
• Any attempt to probe or scan the University network or any network outside of the University network.
• Knowingly causing a computer virus to become installed in a computer system or a file.
• Knowingly use the campus network to disseminate “spam” messages (i.e., unsolicited bulk email messages that are unrelated to the mission of the University.
• Any action that is deemed threatening or harassing to Maryville users, administrators, or persons outside of Maryville.
• The creation or intentional distribution of any virus or worm.
• Disabling, tampering with, or accessing any Maryville University system, network device or cabling.
• Providing any unauthorized user with access to a personal login ID or establishing any function or device which provides unauthorized access to the Maryville network via the Internet or otherwise.
• Unauthorized entry into a file to use, read or change the contents, or for any other purpose.
• Unauthorized transfer of a file
• Using any Maryville owned computer or technology for commercial purposes or solicitation.
• Installing or using a wireless access point that is not owned by the University.
• Failure to report known or discovered network security flaws.
• Using a network based proxy to circumvent bandwidth control mechanisms, and any network security device.
• Sending e-mail or any other type of electronic communication that contains profanity, crude language, or sexually explicit messages to any individual on or off the Maryville University network.
• Use of computing facilities and resources to send, display or print obscene or abusive messages.
• Knowingly using the campus network to send any threatening, or otherwise inappropriate message.
• Distributing, possessing, or accessing files, images, or videos that are pornographic in nature via the Maryville network. This includes, but is not limited to, websites, electronic media, peer-to-peer, or file sharing programs.
• Using, downloading, or installing any peer-to-peer file sharing application such as Gnutella, BearShare, KaZaa, or Morpheus.
• Illegal download of copyrighted software and other works (i.e., music files).
• Use of computing facilities and resources to interfere with the work of another student, faculty member or University official.
• Use of computing facilities and resources to interfere with normal operation of University computing systems.