seek to gain unauthorised access to restricted areas of the University’s Network;</li>
<li>access or try to access data where the user knows or ought to know that they should have no access;</li>
<li>carry out any hacking activities.
Created by Docbot version v3
Comments:
No comments found
We track editorial changes to analyses and updates to a point's status and display the previous versions here as part of an effort to promote transparency regarding our curation process. Unfortunately, for this point, due to how it was stored in our database, there are no previous versions available for display.