I agree that wording in sections 2.1.1. and 2.1.2 needs to be consistent with UAP Policy 2500 language that states:
Users shall not:
– attempt to defeat or circumvent and security measures, controls, accounts, or record-keeping systems
(UAP 2500 Section 3.1)
– physically or electrically attach any device to a University computer, communications devices, or wired or wireless network connection that negatively impacts the performance of any other University computing service
(UAP 2500 Section 3.3)