You are currently in the confidential and secure reporting structure of EthicsPoint. Below are the choices available to you. Please click on the arrow (Arrow Example) to select the type of report you would like to make.

SFA - Information Technology
Data Privacy/Integrity Refers to the technical, contractual, administrative and physical steps taken by the institution to protect against unauthorized access to and disclosure of personally identifiable data of students, faculty and other third parties that we possess.
Malicious / Inappropriate Use of Technology Use of institution's Information Technology that violates the 'Use of Information Technology Resources Policy'.
Misuse of University Resources Improper or unauthorized use of University resources (for example, the use of University computers for private enterprise).
Software Piracy Unauthorized use of or copying of software; also includes the use of unauthorized software on University owned systems.
Other Other potential violations not categorized in the above types.