Policy Category: Community Standards

Appropriate Use

TCU expects all users of University Computing Resources to respect the rights and privacy of other users, respect the integrity of physical facilities and controls, and respect the ownership and usage rights for digital media.  You may only use those University Computing Resources that you are authorized to use, and must use them in the… Read more »

Community Standards

Non-Smoking Policy Smoking, including use of e-cigarettes, is not al­lowed in any University housing facility. Smoking must take place at least twenty (20) feet away from an entrance/ exit to a building. This policy applies to the use of e-ciga­rettes and other vapor-like items. Violators are subject to disciplinary action. Overnight Guests Occasional overnight guests… Read more »

Compliance Officers

To view the list of compliance officers at TCU, please visit the TCU Human Resources website..

Copyright and Intellectual Property

Unauthorized duplication of copyrighted works, such as books, movies, photographs, video games, music and software, is a violation of federal copyright law.  TCU supports strict compliance with federal laws regarding copyright infringement.  Anyone who engages in illegal copying shall be subject to disciplinary action under TCU’s policies and may be sued in federal court by… Read more »

Data Retention & Destruction

TCU systems are backed up on a routine basis to ensure the ability to recover from computer or network failures or disturbances.  TCU cannot, however, guarantee the restoration of any lost or deleted information stored on its servers. Further, once your relation with TCU ends, your access to University Computing Resources terminates. Therefore, a user… Read more »

E-Mail | Electronic Communications | Social Networks

Electronic communications (e-mail, text messages, social networks, blogs, etc.) enjoy tremendous popularity in our society.  Much of the communication between TCU staff, administration and students will be electronic.  The informality and immediacy of electronic communications can, however, lead to content abuse.  TCU neither sanctions nor censors individual expression of opinion in electronic communications, but TCU… Read more »


Suspected violations of this policy will normally be handled through TCU disciplinary procedures applicable to the relevant user.  TCU may suspend a user’s access to University Computing Resources, prior to the initiation or completion of such disciplinary procedures, when it reasonably appears necessary to preserve the integrity, security, or functionality of University Computing Resources or… Read more »


Mary Couts Burnett Library provides intellectual resources, innovative technology tools, and an inspiring physical and virtual environment to serve TCU’s diverse community of learners, supported by approachable and resourceful staff. Students have access to over 120,000 unique journal titles and more than 1.9 million books, CDs, DVDs, videos, and other items housed in the Library… Read more »

Network and Computing Policy

Introduction TCU provides technology to help facilitate the academic, research, and administrative needs of students, faculty and staff.  Technology allows you to quickly and efficiently access and exchange information, both within the TCU community and around the globe.  This valuable resource is provided as a privilege, and with that privilege comes the responsibility of all… Read more »

Privacy | Access | Disclosure of Information

In general, information stored on a computer or sent electronically over a network is considered private and confidential, unless the owner or sender makes that information available to others.  All users must respect this right of privacy.  Examination of private information without authorization from the owner is a violation of this policy.  Merely attempting to… Read more »