Any and all entities (human or machine) who use or attempt to use any computer or peripheral, or piece of network equipment or the network itself, without explicit permission (generally denoted by the creation of an account on an EECS computer by a duly authorized EECS staff member), and any person who does have permission but is engaged in any activity that is defined as illegal by any Federal, State or City law, or is in violation of any of the University's codes of conduct, hereby agrees to the following terms:
Permission is given by any and all persons involved in unauthorized use of EECS computers, peripherals, networks and network equipment to monitor any and all communications on the network, and any and all use of computers and other resources. Permission is given to record any such activity, and to use the recording in any way.
Permission is explicitly given (by unauthorized use of EECS computers, peripherals, networks and network equipment) to use any logins and passwords recorded, on any computer or network (owned by EECS or not) for any purpose the staff of EECS deems necessary.
Page creatd June 7, 2002