How is Information Technology abuse defined?

An Information Technology incident is loosely defined as a violation of the law, constitutes harassment, violates regulatory requirements, violates Sac State policy, compromises University data or that of any person, or involves the unexpected disruption of University services.

Additional Resources:

What are some examples that could fall under IT abuse?

Examples of possible IT abuse include accessing your computer or your data without permission or authority, hacking a University system, using University IT resources to hack into any non-University computer system, using University IT resources to harass or threaten someone, or violating state or federal regulations with University IT resources.

Additional Resources:

How do I report abuse?

Complete and submit an Incident Report. This report can be found on the Information Security Office (ISO) webpage. The standard response to most reported incidents is 2 hours.

Additional Resources: