Skip to main content
Regulations

L. Misuse of Identification or University Resources

L. Misuse of Identification or University Resources

Prohibited behaviors include:

  1. Possession and/or use of fake or altered identification
  2. Unauthorized entry into, presence in, or use of University facilities equipment or property which has not been reserved or accessed through appropriate University officials
  3. Unauthorized use or lending of a UM student identification card
  4. Unauthorized use, possession, distribution or duplication of any University key
  5. Misusing or assisting in the misuse of telephones and communication equipment including using any form of communication equipment to harass or threaten any person(s); using any form of communication equipment to disrupt the normal operations or activities of any person, organization, or the University
  6. Failure to adhere to the University’s Computing Resources Acceptable Use Policy. Prohibited behaviors include but are not limited to misusing University computing resources by intentionally making, receiving, accessing, altering, using, providing or in any way tampering with files, discs, programs, passwords, messages or other computer users without their permission; attempted or actual unauthorized copying, transfer, modification, or destruction of University-owned software, programs, records, or data; attempted or actual interference with the normal operation of the University‚Äôs computing system; using computer resources to harass others or in ways that violate institutional computer use policies; violation of any University policy or public law as it related to technology and usage of data. Administrative Policy – 01:010 Use of Information Resources