Graduate Academic Integrity Violations
3.0 Violations of Academic Integrity
3.1. Academic integrity encompasses many principles: intellectual property, fair use, and adherence to the canons of scientific inquiry and reporting.
3.2. Violations of academic integrity reflect negatively on the academic program, the Graduate School, the University, and the graduate student; thus, academic dishonesty in all its forms cannot be tolerated.
3.3. Academic integrity may be violated any number of ways. Common examples of academically dishonest behavior include, but are not limited to, the following:
18.104.22.168. Cheating involves the intentional use of or attempts to use unauthorized materials, information, or study aids in any academic exercise.
22.214.171.124. Cheating may include, but is not limited to:
126.96.36.199.1. Copying from another student's work.
188.8.131.52.2. Representing material prepared by another as one's own work.
184.108.40.206.3. Submitting the same work in more than one course without prior permission of both instructors.
220.127.116.11.4. Using electronic devices to communicate information during exams.
18.104.22.168.5. Procuring or using stolen evaluation materials.
22.214.171.124.6. Violating rules governing the administration of examinations.
126.96.36.199.7. Violating any rules relating to academic conduct of a course or program.
188.8.131.52. Any false information, data, or citation in an academic exercise.
184.108.40.206. Plagiarism is the representation of the words, ideas, or sequence of ideas of another as one's own in any academic exercise.
220.127.116.11. Examples of plagiarism include, but are not limited to:
18.104.22.168.1. Copying another person's paper, article, or computer work and submitting it as one's own for an assignment; quoting, paraphrasing, or summarizing and utilizing someone else's ideas without attribution.
22.214.171.124.2. Copying or downloading (cyber-plagiarism), in part or in whole, articles or research papers found on the Internet or using ideas or information found on the World Wide Web and not giving proper attribution.
126.96.36.199.3. Information stored on a computer system or portable device or sent electronically over a network is the private property of the individual who created it. Dissemination of information, without authorization from the owner of said information, is a violation of the owner's right to control his or her own property and is considered a form of attempted theft.
3.3.4. Misrepresentation of Academic Records.
188.8.131.52. Misrepresentation of an academic record is knowingly making a false statement regarding one's academic credentials, concealing material information, or forging a University academic document or record.
184.108.40.206. Misrepresentation extends to tampering with computer records and falsifying academic information on one's resume.
3.3.5. Facilitation of Academic Dishonesty.
220.127.116.11. Facilitating academic dishonesty is knowingly or negligently allowing one's work to be used by another without appropriate attribution.
18.104.22.168. It includes participation in or the failure to report known or suspected instances of academic dishonesty.
3.3.6. Impeding the Progress of Another Student or Scholar.
22.214.171.124. It is a violation of academic integrity to deliberately impede the progress of another student or scholar.
126.96.36.199. Examples of offenses of this type include, but are not limited to:
188.8.131.52.1. Denying access to scholarly resources.
184.108.40.206.2. Giving students false or misleading information.
220.127.116.11.3. Making library material unavailable to others by stealing or defacing books or journals or by deliberately misplacing or destroying materials.
18.104.22.168.4. Altering computer files that belong to another without prior permission.
3.3.7. Computer Misconduct.
22.214.171.124. Computer misconduct consists of violating rules of usage set forth by Gallaudet University.
126.96.36.199. A copy of these rules may be viewed at the following site: Administration and Operations Manual 2.22 Use of Information Technology Resources