Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Briefly describe two or three examples of academic policy violations that were described in the study materials for this topic. How do these violations, and

Briefly describe two or three examples of academic policy violations that were described in the study materials for this topic. How do these violations, and academic dishonesty in general, undermine the purpose of graduate school?

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
ssc.gcu.edu Examples of Policy Violations - 1. Academic Dishonesty 2. Student Conduct Student Conduct Threatening Statements Acting or communicating in any form, whether oral or written, that threatens or violates the personal safety of any fellow student, faculty member, or member of the University staff An example of this policy violation is sending an email which contains threatening statements to the instructor after you earned a low grade for your Module 5 assignment. Physical Assault or Abuse 4:32 A ssc.gcu.edu Student Success Center E Threats to harm or endanger the safety of others Threatening the safety of others can be interpreted as emailing University's Staff that you want to "blow up Grand Canyon University." Violence or Acts of Aggression Behaviors or actions interpreted by a reasonable person as carrying the potential for violence or acts of aggression This policy would be violated by following the instructor to her car with the intent of confrontation. Disrupting or Interfering with the Educational Process Communicating or behaving in any form that disrupts or interferes with the educational process Emailing the entire class about your concerns regarding the instructor and your grades is communication that disrupts the educational process. Falsification AT anti ofssc.gcu.edu H | | Student Success Center Falsification, Alteration, or Invention of Information Falsification, alteration, or invention of information, including, but not limited to, any document used for admission or eligibility to the University, document used to apply for financial aid, or other official University documents. Forging your cooperating instructor's signature on your Practicum Observations forms is falsifying information. Harassment Harassment in any form that creates a hostile or offensive educational environment for a student, faculty member, or staff member Harassment can be interpreted by repeatedly emailing or phoning your instructor without providing sufficient time for your instructor to reply. Failing to Comply with Reasonable Directive from a Faculty Member or University Official Failing to comply promptly with any reasonable directive from ey e e or University ssc.gcu.edu H | | Student Success Center Failing to Comply with Reasonable Directive from a Faculty Member or University Official Failing to comply promptly with any reasonable directive from a faculty member or University official After the instructor advised the class that all exams must be completed in the presence of a proctor, you submitted the exam individually. Failing to Cooperate with Officials in a University Investigation Failing to cooperate with officials in a University investigation After you were questioned by University Staff, you knowingly failed to provide the information which the University was seeking. Violating the University's Drug and Alcohol Policies Possessing, using, distributing, or being under the influence of alcohol or illegal drugs while on University property or as part of any University activity ssc.gcu.edu - | Student Success Center not have a prescription during clinical or practicum settings. Attending Class in One's Stead With the exception of authorized persons, permitting anyone access to one's classroom, attend class in one's stead, or attending class for another Attending class in one's stead can be illustrated by providing a friend your username and password to submit your assignment because you are on vacation without Internet access. Sharing One's Password or Using Someone Else's Password Sharing one's password or using someone else's password for any University system or network Using your friend's password and username to access their e-book is sharing one's password. Misusing any University System or Network Using any University system or network resources to upload, download, or otherwise share and/or distribute any copyrighted music videa snftwar Writen works or other

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Smith and Roberson Business Law

Authors: Richard A. Mann, Barry S. Roberts

15th Edition

1285141903, 1285141903, 9781285141909, 978-0538473637

More Books

Students also viewed these Law questions