You are currently in the confidential and secure reporting structure of EthicsPoint. Below are the choices available to you. Please click on the arrow (Arrow Example) to select the type of report you would like to make.

Rice University - Information Technology
Data Privacy / Integrity Refers to the technical, contractual, administrative and physical steps taken by the institution to protect against unauthorized access to and disclosure of personally identifiable data of students, faculty and other third parties that we possess. Includes the theft of, and intentional or inadvertent loss of such data.
Fraud The intentional misrepresentation or concealment of information in order to deceive, mislead, or acquire something of value. A fraud is an intentional deception perpetrated to secure an unfair gain. (Examples include: Violation of Policy, Sabotage)
Improper Supplier or Contractor Activity Supplier or contractor activity in violation of institution’s policies and procedures; improper supplier or contractor selection based on personal gain, improper negotiation or diversion of contract awards.
Software Piracy / Intellectual Property Infringement Unauthorized and unlawful disclosure of confidential business information including inventions, research and technical data, computer programs, trademarks, patents, copyrights, unpublished financial or pricing information and all related documentation.
Malicious / Inappropriate Use of Technology Use of institution’s Information Technology that violates the ‘Usage of Technology Resources Policy.’
Theft The act of stealing; specifically: the felonious taking and removing of personal property with intent to deprive the rightful owner of it. To appropriate (as property entrusted to one's care) fraudulently to one's own use (Examples include: bookkeeping errors, misapplication of funds, and mishandling of cash)
Other