You are currently in the confidential and secure reporting structure of EthicsPoint. Below are the choices available to you. Please click on the arrow (Arrow Example) to select the type of report you would like to make.

Utah Valley University
Information Technology
Data Privacy/Integrity - Information Technology Refers to the technical, contractual, administrative and physical steps taken by the institution to protect against unauthorized access to and disclosure of personally identifiable data of students, faculty and other third parties that we possess.
Improper Supplier or Contractor Activity - Information Technology Supplier or contractor activity in violation of institution’s policies and procedures; improper suppler or contractor selection based on personal gain, improper negotiation or diversion of contract awards.
Improper Use of Intellectual Property, Copyright Violations or Software Piracy - Information Technology Unauthorized and unlawful disclosure of confidential information including inventions, research and technical data, formulas, discoveries, designs, improvements, ideas, manufacturing directives, computer programs, trademarks, patents, copyrights, unpublished financial or pricing information and all related documentation. Any misuse of the institution's information technology.
Malicious / Inappropriate Use of Technology Use of institution’s Information Technology that violates the ‘Usage of Technology Resources Policy.’
Misuse of Resources Unauthorized use of corporately owned copyrights or software; also includes the use of unauthorized software on corporately owned systems.
Software Piracy/Intellectual Property Infringement Unauthorized use of copyrights or software; also includes the use of unauthorized software on college owned systems.
Theft The act of stealing. The taking or removing of personal or Institute property.
Other Information Technology Matters Other instances of use, misuse, or abuse of University hardware, software, or network resources that could adversely impact the University.
Copyright  © 2000-2014 EthicsPoint, Inc. All Rights Reserved
Privacy Policy  |  Safe Harbor Information  |  Acceptable Use Policy  |  Contact Us  |  Site Map