This site requires JavaScript to be enabled
IE BUMPER
IE BUMPER

Information Resources and Technology

IE BUMPER
IE BUMPER

Information Technology (IT) Abuse

This article defines what information technology abuse and if it occurs, how to report it.
Contents
  1. How is Information Technology abuse defined?
  2. What are some examples that could fall under IT abuse?
  3. How do I report abuse?
  4. Additional Resources:

How is Information Technology abuse defined?

An Information Technology incident is loosely defined as a violation of the law, constitutes harassment, violates regulatory requirements, violates Sac State policy, compromises University data or that of any person, or involves the unexpected disruption of University services.

What are some examples that could fall under IT abuse?

Examples of possible IT abuse include accessing your computer or your data without permission or authority, hacking a University system, using University IT resources to hack into any non-University computer system, using University IT resources to harass or threaten someone, or violating state or federal regulations with University IT resources.

How do I report abuse?

Complete and submit an Incident Report. This report can be found on the Information Security Office (ISO) webpage. The standard response to most reported incidents is 2 hours.

Additional Resources:

Information Security - KB0010538 by Matthew Mills | Published:2016-01-26 | Updated:2016-10-07 08:39:44 | Views::6,455

IE BUMPER
IE BUMPER
Version 1.3.1 (release notes)