Policy

Unauthorized Entry or Use of University Facilities

________________________________________
Document Number: STUD--126
Revision #: 2.0
Document Owner: VP of Facilities and Infrastructure
Date Last Updated: 06/14/2018
Primary Author: Dean of Students
Status: Approved
Date Originally Created: 11/14/2011
________________________________________
General Description

Description:
Information for students relative to Unauthorized Entry or Use of University Facilities

Purpose:
Delineation of policy

Scope:
All faculty, staff, students, and administrators, Students

Responsibility:
Administration
Dean of Students
Residence Life
Safety and Security
Student Life
University planner
Executive Director of Facilities and Safety
________________________________________
Requirements

Relevant Knowledge: 
State statutes
Standards of good practice
Standard company policies
National Greek policies
Local statutes
Federal statutes
Current University policy

Terms and Definitions:
Additional training
Corrective Action
Expulsion
Loss of privilege, general
Suspension-student
________________________________________
Policy Provisions

1. Unauthorized Entry or Use of University Facilities

A. No student shall enter any University building, office or other facility without proper authorization nor shall any person remain without authorization in any building after normal closing hours.

B. No student shall make unauthorized use of any University facility.

C. Unauthorized possession or use of University keys is prohibited.

D. Students and/or student groups may not make reservations in their names for outside groups or organizations to use University space.

E. No student shall make unauthorized use or misuse of the University's computing facilities and/or photocopying facilities to include: logging on an account without the knowledge and permission of the owner, changing, deleting or adding to the programs, files and/or data without authorization of the owner; theft of program data or machine resources; copyright infringement or other violations; attempts to thwart security of the computer system; attempts to disrupt the normal operations of the computer system, including hardware and software.



________________________________________
Performance Evaluation

Performance Metrics:
Compliance with standard policy and procedure

Consequences:
Expulsion
Further training
Job Termination
Loss of privileges
Suspension
Suspension-student
Write-Up
________________________________________
Subject Experts

The following may be consulted for additional information.

Dean of Students

VP of Facilities and Infrastructure