Computer Use Policies

Computer resources are available to students, faculty and staff in the Library. These resources must be used in a responsible, ethical and equitable manner. The Library adopts the Tennessee State University Academic Computing Department "Code of Computing Practice. "

The following code of computing practice must be adhered to by all computer resources users:

    1.     Users are authorized to use the computer resources for purposes that conform to the
            goals and objectives of the Library and the University.

    2.     Users of computer resources are expected to conduct themselves in a manner
            that does not constitute a danger to any person's health or safety, interfere with,
            or harass individuals, Library or TSU activities.

    3.     Users must not misuse, damage, or misappropriate in any manner computing
            equipment, property, and other facilities and resources.

    4.     Users are responsible for the use of their computer resources; and as such, 
            they should take precautions against others obtaining access to their computer
            resources. This includes managing and controlling the use of individual passwords,
            operational activities, and resource utilization.

    5.     Users must utilize only those resources which have been authorized for their use 
            and only for the purpose for which the authorization was granted. The fact that a 
            resource is unprotected does not imply permission for an unauthorized person to 
            use it.

    6.     Users must not attempt to modify system facilities or subvert the restrictions 
            associated with their computer resources. Users must follow the established
            procedures for accessing the computer systems.

    7.     Users shall utilize software and databases only in accordance with the applicable 
            license agreement. TSU licenses the use of most of its computer software from a
            variety of outside companies. TSU does not own these software or its related
            documentation and, unless authorized by the license, does not have the right to 
            reproduce it.

    8.     Those persons using their own personal software on TSU's equipment must show
            ownership of the software (original disks, sales receipt, software license agreement).
            If installing the software on the computer is required, a release form must be filled
            out in advance and the software must be deleted from the machine upon completion
            of work.

    9.     Users must not access, modify, or copy programs, files or data of any sort
            belonging to other users or TSU without obtaining prior authorization from the
            appropriate authority. Similarly programs, subroutines, data, equipment and
            other computing related resources may not be taken from TSU to other computer
            installations without the proper authorization and action (e.g., security of access to
            the data at the other computer installation.)

  10.     Users should minimize the impact of their work on other users. Attempts should not
            be made to encroach on others' use of the facilities or deprive them of resources.

webpage contact: