1 Overview This document spells out specific rules on prohibited activities when using Tulane University's network and computing resources. These specific rules are defined by the Information Security Office to serve as a guide to the Acceptable Use Policy (AUP). This list of prohibited activities or behaviors are not exhaustive and the AUP remains the primary document for acceptable use of Tulane University network and computing resources. Please contact the Information Security Officer (email@example.com) if you require more information.
2 Specific Rules The following activities and behaviors are prohibited:
2.1 Unauthorized access
2.2 Unauthorized Operations
3 Other Relevant University Policies