30.32 - Computer Security Violations

January 11, 2010

A. General. Information Technology Services (ITS) monitors access to computer systems on a continuous basis. Unauthorized or improper access to datasets is defined as computer crime and will be prosecuted to the full extent of the law [See 30.32 (B)]. University Computer Use Policy may be viewed at APM 30.12. [ed. 1-10]

The following security procedures are used for various UI computer systems.

A-1. Administrative Systems Access. Access for campus users is determined by individual assigned userids in combination with personal passwords. Any workstation will be locked out by the security system for some period of time after four unsuccessful logon attempts. If problems develop, contact the Help Desk in ITS for assistance, at (208) 885-4357 (dial 5-HELP). [ed. 1-10]

B. Process. Computer Crime, Idaho Code, 18-2202. Idaho Code specifies unauthorized computer access or manipulation as criminal activity. The following sections come directly from Idaho Code, 18-2202. Any person or persons violating any of the following code sections will be prosecuted to the fullest extent of the law.

B-1. Any person who knowingly accesses, attempts to access or use, or attempts to use any computer, computer system, computer network, or any part thereof for the purpose of: devising or executing any scheme or artifice to defraud; obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises; or committing theft; commits computer crime.

B-2. Any person who knowingly and without authorization alters, damages, or destroys any computer, computer system, or computer network described in section 18-2201, Idaho Code, or any computer software, program, documentation, or data contained in such computer, computer system, or computer network commits computer crime.

B-3. Any person who knowingly and without authorization uses, accesses or attempts to access any computer, computer system, or computer network described in section 18-2201, Idaho Code, or any computer software, program, documentation or data contained in such computer, computer system, or computer network, commits computer crime.

B-4. A violation of the provisions of subsections (1) or (2) of this section shall be a felony. A violation of the provisions of subsection (3) of this section shall be a misdemeanor.

C. Information or Reporting Possible Violations. Any questions regarding computer security or reports of possible security violations should be addressed immediately to ITS, (208) 885-6721.