Theft or misuse of computer facilities, equipment and information technology resources including:
(1) Unauthorized entry into a file, message, or other item to use, read, or change the contents, or for any other purpose.
(2) Unauthorized duplication, transfer, or distribution of a file, message, or other item.
(3) Unauthorized use of another individual's identification and/or password.
(4) Unauthorized monitoring of another's email communications directly or through spyware.
(5) Sending false messages to third parties using another's email identity.
(6) Use of computing facilities and resources to interfere with the work of another student, faculty member, college official, or others outside of CCS.
(7) Use of computing facilities and resources to send, display, or print an obscene, harassing, or threatening message, text or image.
(8) Use of computing facilities and resources to interfere with normal operation of the college computing system, including disrupting electronic communications with spam or by sending a computer virus.
(9) Use of computing facilities and resources in violation of copyright laws.
(10) Adding to or otherwise altering the infrastructure of the college's electronic information resources without authorization.
(11) Any violation of the CCS acceptable use of information technology resources policy.