Computer Use Policies
Computer resources are available to
students, faculty and staff in the Library. These resources must be used in a
responsible, ethical and equitable manner. The Library adopts the Tennessee
State University Academic Computing Department "Code of Computing
The following code of computing
practice must be adhered to by all computer resources users:
1. Users are authorized to use the computer resources
for purposes that conform to the
objectives of the Library and the University.
2. Users of computer resources are expected to conduct
themselves in a manner
that does not constitute a danger to any person's health or safety,
or harass individuals,
Library or TSU activities.
3. Users must not misuse, damage, or misappropriate in
any manner computing
equipment, property, and other facilities and resources.
4. Users are responsible for the use of their computer
resources; and as such,
should take precautions against others obtaining access to their computer
This includes managing and controlling the use of individual passwords,
operational activities, and resource utilization.
5. Users must utilize only those resources which have
been authorized for their use
and only for the purpose for which the authorization was granted. The fact
resource is unprotected does not imply permission for an unauthorized
6. Users must not attempt to modify system facilities
or subvert the restrictions
their computer resources. Users must follow the established
for accessing the computer systems.
7. Users shall utilize software and databases only in
accordance with the applicable
TSU licenses the use of most of its computer software from a
of outside companies. TSU does not own these software or its related
documentation and, unless authorized by the license, does not have the
8. Those persons using their own personal software on
TSU's equipment must show
the software (original disks, sales receipt, software license agreement).
installing the software on the computer is required, a release form must be
advance and the software must be deleted from the machine upon completion
9. Users must not access, modify, or copy programs,
files or data of any sort
belonging to other users or TSU without obtaining prior authorization from
appropriate authority. Similarly programs, subroutines, data, equipment
computing related resources may not be taken from TSU to other computer
installations without the proper authorization and action (e.g., security
of access to
at the other computer installation.)
Users should minimize the impact of their work on other users. Attempts should
be made to
encroach on others' use of the facilities or deprive them of resources.