Computer Misconduct

Acts of misconduct are subject to disciplinary action as well as legal and/or civil action.

  • Unauthorized copying of licensed materials or items protected by copyright. This includes, but is not limited to:

    • Software (Including operating systems, programs, applications, databases, or code.)
    • Multimedia files (Including music, movies, or audio.)
    • Text files
  • Computer hacking is the unwanted or unsolicited entry into a computer system. This includes, but is not limited to:

    • Successful and unsuccessful acts of hacking.
    • Possession of the tools used for computer hacking.
    • Running programs that attempt to identify passwords or codes.
  • Knowingly introduce a computer virus to a computer or network. A computer virus is considered to be a program, either harmless or damaging, that attaches itself to another program and/or has the capability to reproduce in order to infect other computers.

  • Gain or attempt to gain unauthorized access to private or protected information. This includes, but is not limited to:

    • Willful damage or misuse of systems, applications, databases, code, or data.
    • Attempts to gain network privileges which you are not entitled.
  • Unauthorized alteration of system configuration. This includes, but is not limited to interrupting or attempting to interrupt programs that protect data or secure systems.

  • Introduce or use profanity or obscenities on Hawkeye's network, Internet, or any other communications configuration accessible by or connected to Hawkeye's computers or computer systems.

  • Use Hawkeye's network to:

    • Conduct business.
    • Solicit services.
    • Develop, introduce, or circulate inflammatory comments or subjects.
  • Share assigned logins with anyone, for any reason. Each student and employee is responsible for all activities under their assigned login. This includes, but is not limited to:

    • Unauthorized use or attempted use of another person’s login.
    • Unauthorized use of a generic login outside of the context for which it was created.
  • Inappropriate or misuse of email. This includes sending unsolicited email including junk mail, jokes, or chain letters to anyone from Hawkeye's system that is not of a business nature.

  • Install unauthorized personal hardware to any computer or network resource.

  • Install any software on Hawkeye's network. Software installations are the responsibility of Hawkeye's Communication and Information Systems department.

  • Unauthorized entry into a file to use, read, or change the contents, or for any other purpose.

  • Unauthorized transfer of a file.

  • Use computer facilities to interfere with the work of another student, instructor, or Hawkeye official.

  • Use computer facilities to send, print, or display obscene or abusive messages or materials.

  • Use computer facilities to interfere with normal operation of Hawkeye’s computer system.

  • Inappropriate or misuse of printing resources. This includes, but is not limited to:
    • Printing of profanity or obscenities.
    • Printing items not directly associated with class materials.

Contact Information

Dean of Students

Norman Coley
Student Services
Hawkeye Center 208
319-296-4014
Email Norman Coley

Back to top