2024-25 Student Handbook

Computing Practices

The list below constitutes a code of computing practice for all persons using the University network system. It is important for all users to practice ethical behavior in computing activities because of the many valuable and sensitive resources involved and because of the effect one user’s practices can have on the work of others.

Disciplinary action for violating the code will be governed by the applicable provisions of the Student Handbook, Code of Computing Practice Violations, and the Computer Crimes Act of the State of Tennessee.
1. The University is not liable for students’ actions when connecting to the Internet through University network. Students assume liability for their own actions.
2. Students are responsible for being aware of and following the published procedures for accessing the computer network system.
3. Students are responsible for complying with laws protecting software or other accessed information. Downloading programs and files may violate United States copyright laws that protect information and software. All files downloaded from a source external to the University must be scanned for viruses.
4. Students should be aware that usage statistics in archived log files, used for monitoring system performance and usage patterns, are maintained by the University concerning traffic initialed from the University network.
5. Students must use only the user account which has been authorized for their use. Students must use the user account only for the purpose for which they are authorized. Use of the University’s network resources for personal or business financial gain without express authorization is prohibited.
6. Students are responsible for the use of their user account. Students should make use of system-provided protection features such as passwords, and students should take precautions against others obtaining access to network resources under your provided credentials. Sharing network credentials (username and password) is prohibited at all times.
7. Students may not access or copy the programs, files, or data belonging to other persons or to the University without prior authorization to do so. Students may not attempt to access files for which they do not have authorization. Programs and data provided by the University are not to be taken to other computer sites without permission. Students may not use personal software on the school’s computers and may not install any programs on the school’s computers.
8. To minimize the impact of activities on the work of other persons, students must not attempt to encroach on others’ use of the facilities or deprive them of resources. Deliberate wasteful use of resources, such as printing or storing large amounts of unnecessary data or the downloading or uploading of large or excessive number of files for purely recreational purposes is prohibited.
9. Students are expected to conduct themselves in a manner that does not offend or harass others and that does not interfere with individual and campus activities. Resources are not to be used to store or transmit obscenities or other potentially offensive material.
10. The use of any network packet sniffing tool or “booster/stressor services” or any personal wireless router on the University network is prohibited.
11. Students may not attempt to modify system facilities, misuse, damage, or misappropriate computer equipment, campus network resources, or property.
Tennessee law provides that certain computer offenses are criminal acts and prescribes penalties for unlawful activities related to computer usage. UT Southern believes it is important for users to be aware of the Tennessee Computer Crimes Act and its provisions, which are found in Tennessee Codes Annotated, Sections 39-14-601, et seq.