When it has been determined that there has been a violation, the University may restrict or prohibit access by an offending party to its information technology resources or its electronic mail systems or services through University-owned or other computers or remove or limit access to material posted on University-owned computers or networks.4.