This is the University of Northern Colorado's (UNC) computer infrastructure. These resources, including all related equipment, networks, and network devices, are provided for authorized UNC use only. UNC computer systems may be monitored for official purposes.
Use of UNC's computing infrastructure, authorized or unauthorized, constitutes consent to this policy and the policies and procedures set forth by UNC. Evidence of unauthorized use collected during monitoring may be used for administrative action and/or civil prosecution by University legal counsel and law enforcement agencies.