82.6k views
0 votes
The UT policy of Acceptable Use of Information Technology Resources specifies that if a user suspects unauthorized activity on their account, or that their account has been compromised, they must report the compromise to the University authority. True or False?

1) True
2) False

User Sean Ryan
by
8.8k points

1 Answer

7 votes

Final answer:

True, the Acceptable Use Policy for Information Technology Resources typically requires users to report any unauthorized activity or compromise of their account to the university authority. The statement is 1) true.

Step-by-step explanation:

The question pertains to the Acceptable Use Policy for Information Technology Resources at a university. The policy likely requires users to report any suspicion of unauthorized activity on their account, or evidence that their account may have been compromised, to the university authority.

This aligns with standard best practices for information security, which are designed to protect users from the consequences of identity theft or 'True-name Fraud.'

In such cases, a criminal wrongfully obtains and uses someone else's personal identification and account information, leading to potential financial harm and other serious issues. The statement is 1) true.

User Anumi
by
8.7k points