Downloading. installing, or running security programs or utilities that reveal weaknesses in the security of MUS computer resources, except by a MUS employee as specifically required by that employee's assigned job responsibilities.
Appears in 5 contracts
Samples: Collective Bargaining Agreement, Collective Bargaining Agreement, Collective Bargaining Agreement