The Bethel University catalog gives the following statement and definitions: Activities that have the effect or intention of interfering with education, pursuit of knowledge, or fair evaluation of a student’s performance are prohibited. Examples of such activities include, but are not limited to, the following definitions:
1. Cheating: Using or attempting to use unauthorized assistance, material, or study aids in examinations or other academic work, or preventing or attempting to prevent another from using authorized assistance, material, or study aids. Examples: using a cheat sheet in a quiz or exam; altering a graded exam and resubmitting it for a better grade, etc.
2. Plagiarism: Using the ideas, data, or language of another without specific and proper acknowledgment. Examples: misrepresenting another’s work (paper, lab report, article, or computer work) as one’s own original creation and submitting it for an assignment; using someone else’s ideas without attribution; failing to cite a reference or to use quotation marks where appropriate, etc. (For further discussion of plagiarism, click here.)
3. Fabrication: Submitting contrived or altered information in any academic exercise. Examples: making up data for an experiment; fudging data; citing nonexistent or irrelevant articles, etc.
4. Multiple submission: Submitting, without prior permission, any work submitted to fulfill another academic requirement. Example: submitting the same paper for two different classes, etc.
5. Misrepresentation of academic records: Misrepresenting or tampering with or attempting to tamper with any portion of a student’s transcripts or academic record, either before or after coming to Bethel University. Examples: forging a registration form or a change of grade slip; tampering with computer records, etc.
6. Facilitating academic dishonesty: Knowingly helping or attempting to help another violate any provision of this code. Example: working together on a take-home exam or other individual assignment, etc.
7. Unfair advantage: Attempting to gain unauthorized advantage over fellow students in an academic exercise. Examples: gaining or providing unauthorized access to examination materials (either past or present); obstructing or interfering with another student’s efforts in an academic exercise; lying about a need for an extension for an exam or paper; continuing to write even when time is up during an exam; destroying, hiding, removing, or keeping library materials, etc.
8. Computer crimes: Damaging or modifying computer programs without permission. Examples: software piracy; hacking; constructing viruses; knowingly introducing viruses into a system; copying programs and data belonging to others, etc.