You are currently in the confidential and secure reporting structure of EthicsPoint. Below are the choices available to you. Please click on the arrow (Arrow Example) to select the type of report you would like to make.

Rochester Institute of Technology
Information Security/Privacy
Data Privacy/Integrity Refers to the technical, contractual, administrative and physical steps taken by the institution to protect against unauthorized access to and disclosure of personally identifiable data of students, faculty and other third parties that we possess.
Falsification of Contracts, Reports or Records - Information Security/Privacy Falsification of records consists of altering fabricating, falsifying, or forging all or any part of a document, contract or record for the purpose of gaining an advantage, or misrepresenting the value of the document, contract or record.
Fraud - Information Security/Privacy The intentional misrepresentation or concealment of information in order to deceive, mislead or acquire something of value. A fraud is an intentional deception perpetrated to secure an unfair gain (examples include: Violation of Policy, Sabotage).
Improper Supplier or Contractor Activity - Information Security/Privacy Supplier or contractor activity in violation of corporate policies and procedures; improper supplier or contractor selection based on personal gain, improper negotiation or diversion of contract awards.
Misuse of Resources Improper or unauthorized use of Institution resources for personal gain.
Software Piracy/Intellectual Property Infringement Unauthorized use of copyrights or software; also includes the use of unauthorized software on Institute's systems.
Theft The act of Stealing; specifically: the felonious taking and removing of personal property with intent to deprive the rightful owner of it.
Other - Information Security/Privacy If none of the above categories describe the matter, please use this category.