Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Programs that harass other users or infiltrate computer systems should not be used. Employees are prohibited from intentionally seeking information on, obtain copies of or modify files or data belonging to others unless authorized.

See Also:

Internet Access Requests