- Home >
- WRITE Program >
- Libraries and Media Centers >
- Library
- > Computer Use Policies
Computer Use Policies
Computer resources are available to students, faculty and staff in the Library. These resources must be used in a responsible, ethical and equitable manner. The Library adopts the Tennessee State University Academic Computing Department "Code of Computing Practice. "
The following code of computing practice must be adhered to by all computer resources users:
1. Users are authorized to use the computer resources for purposes that conform to the
goals and objectives of the Library and the University.
2. Users of computer resources are expected to conduct themselves in a manner
that does not constitute a danger to any person's health or safety, interfere with,
or harass individuals, Library or TSU activities.
3. Users must not misuse, damage, or misappropriate in any manner computing
equipment, property, and other facilities and resources.
4. Users are responsible for the use of their computer resources; and as such,
they should take precautions against others obtaining access to their computer
resources. This includes managing and controlling the use of individual passwords,
operational activities, and resource utilization.
5. Users must utilize only those resources which have been authorized for their use
and only for the purpose for which the authorization was granted. The fact that a
resource is unprotected does not imply permission for an unauthorized person to
use it.
6. Users must not attempt to modify system facilities or subvert the restrictions
associated with their computer resources. Users must follow the established
procedures for accessing the computer systems.
7. Users shall utilize software and databases only in accordance with the applicable
license agreement. TSU licenses the use of most of its computer software from a
variety of outside companies. TSU does not own these software or its related
documentation and, unless authorized by the license, does not have the right to
reproduce it.
8. Those persons using their own personal software on TSU's equipment must show
ownership of the software (original disks, sales receipt, software license agreement).
If installing the software on the computer is required, a release form must be filled
out in advance and the software must be deleted from the machine upon completion
of work.
9. Users must not access, modify, or copy programs, files or data of any sort
belonging to other users or TSU without obtaining prior authorization from the
appropriate authority. Similarly programs, subroutines, data, equipment and
other computing related resources may not be taken from TSU to other computer
installations without the proper authorization and action (e.g., security of access to
the data at the other computer installation.)
10. Users should minimize the impact of their work on other users. Attempts should not
be made to encroach on others' use of the facilities or deprive them of resources.
webpage contact:
library