Rosetta Stone-Language Learning Program
Courtney Orvig
11/7/11
Honor Code
"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://academicintegrity.gmu.edu/honorcode/ I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my sight.This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this sight is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on web site">http://universitypolicy.gmu.edu/1301gen.html web site".
GMU Responsible Use of Computing Policy Statement
Mason provides and maintains general computing services including web and Internet resources, as well as telecommunication technology, to support the education, research, and work of its faculty, staff, and students. At the same time, Mason wishes to protect all users' rights to an open exchange of ideas and information. This policy sets forth the responsibilities of each member of the Mason community in preserving the security, confidentiality, availability, and integrity of Mason computing resources. To accomplish these ends, this policy supports investigations of complaints involving Mason computing abuse, including sexual harassment, honor code, federal, state, applicable industry, and local law violations.
Mason faculty and staff, as state employees, are subject to the Freedom of Information Act, §2.2-3700, et seq., of the Code of Virginia, and all applicable state and federal rules and regulations. While this policy endeavors to maintain user confidentiality it cannot create, nor should faculty or staff members presume, any expectation of privacy.
Violations of this policy may result in revocation of access, suspension of accounts, disciplinary action, or prosecution. Evidence of illegal activity will be turned over to the appropriate authorities. It is the responsibility of all users of Mason computing resources to read and follow this policy and all applicable laws and procedures (user sign-on agreement).
To report violations of this policy, or any related university policy, e-mail the Security Review Panel (SRP) at stopIt@gmu.edu or abuse@gmu.edu
Research Paper Blog and Wiki Links:
Blog
Wiki
Research Paper Link:
Research Paper