Standards of Conduct for the Use of Computers in NSU-Related Activities

It is the policy of Nevada State University that improper conduct regarding computers as set forth in this section is incompatible with the goals of honesty and academic freedom and is strictly prohibited. Improper conduct regarding computer use at the university falls into three categories: (1) academic dishonesty; (2) disruption and destruction of computer facilities; and (3) violation of licenses and copyright agreements, university policy, and state or federal laws.

  1. Academic Dishonesty Pertaining to the Use of Computers. Examples of this type of behavior regarding computers include, but are not limited to:
    1. Submitting another person's programs, documentation, or program results as your own work;
    2. Obtaining or attempting to obtain unauthorized access to information stored in electronic form;
    3. Submitting false results of a program's output for a class assignment or falsifying the results of program execution for the purpose of improving a grade.
  2. Disruption or Destruction of Computer Facilities. Examples of this type of behavior include, but are not limited to:
    1. Damaging or stealing university-owned equipment or software;
    2. Causing the display of false system messages;
    3. Maliciously causing system slowdowns or rendering systems inoperable;
    4. Changing, removing, or destroying (or attempting the same) any data stored electronically without proper authorization;
    5. Gaining or attempting to gain access to accounts without proper authorization;
    6. Putting viruses or worms into a system
  3. Violation of Licenses and Copyright Agreements. Most software used on university computers is covered by copyright, license or nondisclosure agreements. Violation of these agreements puts the university and the individual in jeopardy of civil penalties. Examples of such violations include, but are not limited to:
    1. Making copies of copyrighted or licensed software without proper authorization;
    2. Using software in violation of copyright, license or non-disclosure agreements;
    3. Using university computers for unauthorized private or commercial purposes;
    4. Use of computers or the internet in a manner that is against local, state, or federal laws.