- Home >
- WRITE Program >
- Libraries and Media Centers >
- Policies and Procedures
- > Computer Use Policies
Computer Use Policies
Computer resources are available to students, faculty and staff in the Library. These resources must be used in a responsible, ethical and equitable manner. The Library adopts the Tennessee State University Academic Computing Department "Code of Computing Practice. "
The following code of computing practice must be adhered to by all computer resources users:
1. Users are authorized to use the computer resources
for purposes that conform to the
goals and
objectives of the Library and the University.
2. Users of computer resources are expected to conduct
themselves in a manner
that does not constitute a danger to any person's health or safety,
interfere with,
or harass individuals,
Library or TSU activities.
3. Users must not misuse, damage, or misappropriate in
any manner computing
equipment, property, and other facilities and resources.
4. Users are responsible for the use of their computer
resources; and as such,
they
should take precautions against others obtaining access to their computer
resources.
This includes managing and controlling the use of individual passwords,
operational activities, and resource utilization.
5. Users must utilize only those resources which have
been authorized for their use
and only for the purpose for which the authorization was granted. The fact
that a
resource is unprotected does not imply permission for an unauthorized
person to
use it.
6. Users must not attempt to modify system facilities
or subvert the restrictions
associated with
their computer resources. Users must follow the established
procedures
for accessing the computer systems.
7. Users shall utilize software and databases only in
accordance with the applicable
license agreement.
TSU licenses the use of most of its computer software from a
variety
of outside companies. TSU does not own these software or its related
documentation and, unless authorized by the license, does not have the
right to
reproduce
it.
8. Those persons using their own personal software on
TSU's equipment must show
ownership of
the software (original disks, sales receipt, software license agreement).
If
installing the software on the computer is required, a release form must be
filled
out in
advance and the software must be deleted from the machine upon completion
of work.
9. Users must not access, modify, or copy programs,
files or data of any sort
belonging to other users or TSU without obtaining prior authorization from
the
appropriate authority. Similarly programs, subroutines, data, equipment
and
other
computing related resources may not be taken from TSU to other computer
installations without the proper authorization and action (e.g., security
of access to
the data
at the other computer installation.)
10.
Users should minimize the impact of their work on other users. Attempts should
not
be made to
encroach on others' use of the facilities or deprive them of resources.
webpage contact:
library