Computer Use Policies
Computer resources are available to students, faculty and staff in the Library. These resources must be used in a responsible, ethical and equitable manner. The Library adopts the Tennessee State University Academic Computing Department "Code of Computing Practice. "
The following code of computing practice must be adhered to by all computer resources users:
1. Users are authorized to use the computer resources
for purposes that conform to the
goals and objectives of the Library and the University.
2. Users of computer resources are expected to conduct
themselves in a manner
that does not constitute a danger to any person's health or safety, interfere with,
or harass individuals, Library or TSU activities.
3. Users must not misuse, damage, or misappropriate in
any manner computing
equipment, property, and other facilities and resources.
4. Users are responsible for the use of their computer
resources; and as such,
they should take precautions against others obtaining access to their computer
resources. This includes managing and controlling the use of individual passwords,
operational activities, and resource utilization.
5. Users must utilize only those resources which have
been authorized for their use
and only for the purpose for which the authorization was granted. The fact that a
resource is unprotected does not imply permission for an unauthorized person to
6. Users must not attempt to modify system facilities
or subvert the restrictions
associated with their computer resources. Users must follow the established
procedures for accessing the computer systems.
7. Users shall utilize software and databases only in
accordance with the applicable
license agreement. TSU licenses the use of most of its computer software from a
variety of outside companies. TSU does not own these software or its related
documentation and, unless authorized by the license, does not have the right to
8. Those persons using their own personal software on
TSU's equipment must show
ownership of the software (original disks, sales receipt, software license agreement).
If installing the software on the computer is required, a release form must be filled
out in advance and the software must be deleted from the machine upon completion
9. Users must not access, modify, or copy programs,
files or data of any sort
belonging to other users or TSU without obtaining prior authorization from the
appropriate authority. Similarly programs, subroutines, data, equipment and
other computing related resources may not be taken from TSU to other computer
installations without the proper authorization and action (e.g., security of access to
the data at the other computer installation.)
Users should minimize the impact of their work on other users. Attempts should
be made to encroach on others' use of the facilities or deprive them of resources.