Greetings. Since yours was the second of three reports we have now received regarding students who are spoofing their MAC address in order to use up more bandwidth, I am writing to ask you to share how you knew you had the ability to do this.
I am concerned that in the future ITC may want to begin referring these incidents to the honor (for identity theft) or to the judiciary committee (for violation of computing policy) if they become more common.
My goal is to understand whether this is a new trend and, if so, perhaps put some effort into educating the E-school (all three cases have come in regarding e-school students) to prevent any disciplinary referrals.
Without expecting any names from you, I would appreciate any information you could share with me.
Feel free to call me in my office this week at ###-#### or reply to this email address.
Best wishes for a good ending to your semester,