Student Handbook

UWS Chapter 18: Conduct on University Lands

UWS 18.12

  1. Computer Data, Programs, Equipment or Supplies. No person may willfully, knowingly and without authorization do or attempt to do any of the following:
    1. Modify, destroy, access, take possession of or copy data, computer programs or supporting documentation;
    2. Disclose restricted access codes or other restricted access information to a person not authorized to possess such codes or information;
    3. Modify, destroy, use, take or damage a computer, computer system or computer network;
    4. Modify, destroy, use, take or damage any equipment or supplies used, or intended to be used, in a computer, computer system or computer network.
    5. Cause an interruption in service by submitting a message or multiple messages to a computer, computer program, computer system, or computer network that exceeds the processing capacity of the computer, computer program, computer system, or computer network.
  2. Fraud in University Accommodations or Eating Places.
    1. No person may, after having received any food, lodging or other service or accommodation at any university facility or eating place, intentionally abscond without paying.
    2. No person may, while in any university facility or eating place, intentionally defraud the university or its employees or agents in charge of the facility or eating place, in any transaction arising out of the relationship as a user of the facility or eating place.
    3. In this subsection, prima facie evidence that the person intentionally absconded without paying for the food, lodging or other service or intentionally defrauded the university or its employees or agents has the meaning and includes the items of proof set forth in s. 943.21(2), Stats.
  3. Issue of Worthless Check.
    1. No person may issue any check or other order for the payment of money in an amount not more than $2,500 which, at the time of issuance, he or she intends shall not be paid.
    2. In this subsection, prima facie evidence that the person, at the time he or she issued the check or other order for the payment of money, intended it should not be paid, has the meaning and includes the items of proof set forth in s. 943.24, Stats.
    3. This subsection does not apply to a postdated check or to a check given for past consideration, except a payroll check.
  4. Library Materials.
    1. No person may intentionally take, carry away, transfer, conceal or retain possession of any library material without the consent of a library official, agent or employee and with the intent to deprive the library of possession of the material.
    2. The concealment of library material beyond the last station for borrowing library material in a library is evidence of intent to deprive the library of possession of the material. The discovery of library material which has not been borrowed in accordance with the library's procedures or taken with consent of a library official, agent or employee and which is concealed upon the person or among the belongings of the person or concealed by a person upon the person or among the belongings of another is evidence of intentional concealment on the part of the person so concealing the material.
  5. Retail Theft.
    1. No person may intentionally alter indicia of price or value of merchandise or take and carry away, transfer, conceal or retain possession of merchandise held for resale by a merchant, or property of the merchant, without his or her consent and with intent to deprive the merchant permanently of possession, or the full purchase price of the merchandise.
    2. No person may intentionally remove a theft detection device from merchandise, or use a theft detection shielding device, without the merchant’s consent and with intent to deprive the merchant permanently of possession, or the full purchase price of the merchandise.
    3. In this subsection, “merchant” includes any “merchant” as defined in s. 402.104(3), Stats., and any vendor or bookstore authorized to sell in university buildings or on university lands.
    4. In this subsection, “theft detection device” means any tag or other device that is used to prevent or detect theft and that is attached to merchandise held for resale by a merchant or to property of a merchant, and “theft detection shielding device” means any laminated or coated bag or device designed to shield such merchandise from detection by an electronic or magnetic theft alarm sensor.
  6. Theft.
    1. No person may intentionally take and carry away, use, transfer, conceal, or retain possession of movable property of another with a value of under $100, without consent and with the intent to deprive the owner permanently of such property.
    2. No person may intentionally take and carry away, use, transfer, conceal, or retain possession of movable property of another with a value of at least $100 but not more than $1,000, without consent and with the intent to deprive the owner permanently of such property.
  7. Use of Cheating Tokens. No person may obtain the property or services of another by depositing anything which he or she knows is not lawful money or is an unauthorized token in any receptacle used for the deposit of coins or tokens.
  8. Vandalism. No person may break, tear up, mar, destroy or deface any notice, tree, vine, shrub, flower or other vegetation, or dislocate any stones, or disfigure natural conditions, or deface, alter, destroy or damage in any way any other property, real or personal, within the boundaries of any university lands unless authorized by the chief administrative officer.

Revised effective September 1, 2009