Final answer:
True, the Acceptable Use Policy for Information Technology Resources typically requires users to report any unauthorized activity or compromise of their account to the university authority. The statement is 1) true.
Step-by-step explanation:
The question pertains to the Acceptable Use Policy for Information Technology Resources at a university. The policy likely requires users to report any suspicion of unauthorized activity on their account, or evidence that their account may have been compromised, to the university authority.
This aligns with standard best practices for information security, which are designed to protect users from the consequences of identity theft or 'True-name Fraud.'
In such cases, a criminal wrongfully obtains and uses someone else's personal identification and account information, leading to potential financial harm and other serious issues. The statement is 1) true.