To Home Page To Home Page
General Description
Requirements
Policy Provisions
Performance Evaluation
Subject Experts
Unauthorized Entry or Use of University Facilities
Policy

Document Number: STUD--126 Revision #: 1.0
Document Owner: Executive VP Date Last Updated: 07/11/2013
Primary Author: Dean of Students Status: Approved
Date Originally Created: 11/14/2011

General Description
Description:

Information for students relative to Unauthorized Entry or Use of University Facilities


Purpose:

Delineation of policy


Scope:

All faculty, staff, students, and administrators, Students


Responsibility: Administration
Dean of Students
Residence Life
Safety and Security
Student Life
University planner
Executive Director of Facilities and Safety

Back to Top

Requirements
Relevant Knowledge: In order to comply with this policy you should know:
State statutes
Standards of good practice
Standard company policies
National Greek policies
Local statutes
Federal statutes
Current University policy

Terms and Definitions: Additional training

Corrective Action

Expulsion

Loss of privilege, general

Suspension-student

Back to Top

Policy Provisions
1.

Unauthorized Entry or Use of University Facilities


A. No student shall enter any University building, office or other facility without proper authorization nor shall any person remain without authorization in any building after normal closing hours.

B. No student shall make unauthorized use of any University facility.

C. Unauthorized possession or use of University keys is prohibited.

D. Students and/or student groups may not make reservations in their names for outside groups or organizations to use University space.

E. No student shall make unauthorized use or misuse of the University's computing facilities and/or photocopying facilities to include: logging on an account without the knowledge and permission of the owner, changing, deleting or adding to the programs, files and/or data without authorization of the owner; theft of program data or machine resources; copyright infringement or other violations; attempts to thwart security of the computer system; attempts to disrupt the normal operations of the computer system, including hardware and software.

 


Back to Top

Performance Evaluation
Performance Metrics: Compliance with standard policy and procedure

Consequences: Expulsion
Further training
Job Termination
Loss of privileges
Suspension
Suspension-student
Write-Up

Back to Top

Subject Experts
The following may be consulted for additional information.
Assistant Vice President and University Planner

Dean of Students

Executive VP

Executive Director of Facilities and Safety

Back to Top

This page created 10/30/2014 using Zavanta® version 6.0