• Falsifying, distorting, or misrepresenting information provided; • Making false allegations; • Attempting to discourage an individual’s proper participation in, or use of, the Student conduct process; • Harassment (verbal or physical) or intimidation of any person participating in the Student conduct process; • Failure to comply with any conduct sanctions imposed pursuant to this Student Code. 2.3. Misuse of Institutional Resources or Property, or Personal Property of Others 2.3.1. Tampering with fire and life safety equipment including, without limitation, fire alarms, sprinkler systems, first aid equipment, and laboratory safety apparatus. 2.3.2. Unauthorized taking of, damage to, or possession of property belonging to the Institution, another member of the institutional community, or another person. 2.3.3. Unauthorized possession, duplication, or use of keys, access cards, or access codes to any institutional premises. 2.3.4. Unauthorized entry into, or use of, institutional premises. 2.3.5. Unauthorized possession, entry into, or use of institutional equipment, software systems, or information. 2.3.6. Possession of firearms, stun guns, tasers, BB guns, switchblade knives, fixed- blade knives with a blade length of five (5) inches or greater, or any item that is designed or used to injure or harm another person, fireworks, explosives, or dangerous chemicals on institutional premises or at institutional events, except as explicitly permitted by a Board Policy or an Institutional Policy; 2.3.7. Unauthorized use or abuse of technology, including, but not limited to: • Unauthorized entry into a file or program to use, copy, read, delete, or change the contents, or for any other purpose; • Unauthorized transfer of a file; • Unauthorized use of another individual’s identification or account; • Use of technology to interfere with the work of another student, faculty member, or institutional official; • Use of an Institution’s technology to engage in Harassment. • Use of technology to engage in unlawful activities, including those involving uses that infringe intellectual property rights; • Use of technology to interfere with normal operation of an institution’s technology or other system; • Making, acquiring, or using unauthorized copies of computer files, violating terms of applicable software license agreements, or using the Institution’s technology network or system to download files in violation of copyright laws; • Attempting to circumvent data protection schemes or tampering with security; • Violating institutional or board computer use or internet policies. 2.4. Threat of Harm or Actual Harm to a Person’s Physical or Mental Health or Safety 2.4.1. Violence, which includes, but is not limited to, using or threatening to use physical force 72 NSU STUDENT HANDBOOK 2024-25
RkJQdWJsaXNoZXIy NzkyNTY=