RMU CIS Cybersecurity Exercise Agreement

Statement on student use of Robert Morris University information technology systems in INFS3120 Spring Semester, 2016

Please read carefully before signing:

Purposes of this document:

(1) to alert students to the legal risks and dangers of misuse or abuse of University-provided computing resources in INFS3120, Spring Semester, 2016, and to gain agreement to use assigned software legally and ethically;

(2) to provide a basis of reciprocal permission for computer and other electronic device scanning exercises within the environment allocated for use of students enrolled in INFS3120, Spring Semester, 2016.

Before beginning use of Robert Morris University (hereinafter: University) information technology (hereinafter: IT) systems in INFS3120 Spring Semester, 2016 (hereinafter “this course,”), I, (name printed) ______, by my signature below on (date) ______, 2016, affirm:

(1)that I have read through and understand this document before signing;

(2)that I am aware that the University IT system is a private system with access restricted to authorized users only, and that unauthorized access is strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 or other applicable laws, and that all computer activity may be monitored and reported;

(3)that I am aware that software programs on this system may only be used for course-oriented activities, and that all other use is prohibited including but not limited to external scanning, RMU-owned private and public network and electronic device scanning, and any activity unrelated to the approved curriculum. Engaging in activity to restrict, inhibit, or degrade any other user's use of the network is against University Policy and is subject to disciplinary action;

(4)that I am further aware that (external) scanning of networks, computers, and other electronic devicesoutside the University environment and even outside the environment of this courseand the assignments of this course is illegal and may expose me to detection and criminal prosecution by appropriate authorities and appropriate University disciplinary action, or, if totally within the university environment, at least appropriate University disciplinary action; and

(5)that I grant to the fellow members of this course(for the duration of this course) and its instructional staff and University IT staff permission to conduct analysis scanning on my assigned storage devices using software as part of the instructional assignments for this course.

Signature:______

Printed Name:______