Electronic Media Fraud

Computers and other electronic information technologies function as instruments to facilitate student learning. They can also be employed as means to bypass the discipline of personal learning and mastery, as well as allowing opportunities for other non-academic improprieties. Examples of electronic media fraud include, but are not limited to, the following:

  1. Use of digital cameras, cell phones, or similar devices to capture, store, and transmit partial or whole examinations;
  2. Capturing another person's login and password information to gain unauthorized access;
  3. Unauthorized access to and altering of student grade information stored on the University's learning management system (Moodle), servers, and/or computers;
  4. Unauthorized capture and distribution (e.g., peer-to-peer file sharing) of copyrighted materials, including music, videos, publisher text banks, and/or electronic textbooks, without permission of the publisher.
  5. Sending and/or accessing electronic messages or digital images of course-related materials during examinations;
  6. Malicious attacks on the University's computer system and/or network;
  7. Unauthorized or illegal data mining of University-owned records.
  8. Using electronic technology to misrepresent one's identity to others (i.e., electronic aliases); or
  9. Circumventing University network security systems to gain unauthorized access (i.e. hacking) to information records and/or websites.