Computer abuses include, but are not limited to:
(1) Unauthorized use of university computer resources;
(2) Use of another person's university user name and/or password;
(3) Use of university computing facilities and resources to interfere with the work of another student, an instructor, or other university official;
(4) Use of university computing facilities or resources to send intimidating, harassing, or threatening messages;
(5) Use of a computer or software to interfere with normal operations of the university's computing systems;
(6) Use of the university's computing facilities or resources in violation of any law, including copyright laws; and
(7) Any violation of the university's computer use policies.
[Statutory Authority: RCW
28B.20.130. WSR 17-15-068, § 478-121-117, filed 7/14/17, effective 8/18/17.]