Computer abuses include, but are not limited to:
(1) Unauthorized use of university computer resources;
(2) Use of another person's university user name and/or password;
(3) Use of university computing facilities or resources to interfere with the work of another student, instructor, or university employee;
(4) Use of university computing facilities or resources to send intimidating, harassing, or threatening messages;
(5) Use of a computer or software to interfere with normal operations of the university's computing systems;
(6) Use of the university's computing facilities or resources in violation of any law, including copyright laws; and
(7) Any violation of the university's computer use policies.
[Statutory Authority: RCW
28B.35.120(12). WSR 23-01-027, § 172-121-320, filed 12/9/22, effective 1/9/23.]