Theft or other abuse of computer facilities and resources, including but not limited to:Unauthorized entry into a file, to use, read, or change the contents, or for any other purpose.Unauthorized transfer of a file.Use of another individual's identification and/or password.Use of computing facilities and resources to interfere with the work of another student, faculty member or university official