Appropriate Use

TCU expects all users of University Computing Resources to respect the rights and privacy of other users, respect the integrity of physical facilities and controls, and respect the ownership and usage rights for digital media.  You may only use those University Computing Resources that you are authorized to use, and must use them in the manner and to the extent you are authorized.  Use of University Computing Resources must not violate any applicable laws, rules or policies.  Use of University Computing Resources must adhere to the university’s Code of Conduct policy, available on the Human Resources website at: http://www.hr.tcu.edu.

University Computing Resources are intended to be used for University-related activities and, depending upon the circumstances, reasonable personal use.  What constitutes “reasonable personal use” may depend on your relationship with TCU.  For example, a resident student’s personal internet and e-mail use is generally acceptable, but similar activities by an employee during working hours must not interfere with the employee’s job performance.

Improper use of University Computing Resources can subject you to discipline by TCU.  The following list, while not exhaustive, contains examples of what TCU deems to be improper use.

  • Using University Computing Resources for personal commercial or financial gain.
  • Consuming a significant amount of bandwidth or network resources.
  • Any activity that compromises network security.
  • Knowingly installing or distributing a program, such as a computer virus, intended to damage or strain a computer or network.
  • Allowing unauthorized users to access any TCU network.
  • Using another person’s account.
  • Using or disclosing another person’s password.
  • Connecting personal computers or devices to the University’s Network without prior authorization.
  • Using unauthorized network devices, such as routers, firewalls, and wireless access points.
  • Manually assigning an IP address to a network device or otherwise using an IP address that is not assigned to you.
  • Attempting to access any data or information by breaching or circumventing security measures.
  • Attempts to monitor, analyze, or tamper with network data packets.
  • Personal use of TCU Computing Resources during working hours by an employee of the University which interferes with the employee’s job performance.

In addition to violations of TCU rules, certaincomputer misconduct is prohibited under federal and state laws. Such misconduct can subject you to a civil lawsuit and/or criminal prosecution.  Examples of such misconduct include:

  • Using University Computing Resources to conduct illegal activity, to promote or advocate illegal activity, or to discuss illegal activities with the intent to commit them.
  • Using University Computing Resources to harass, defame, abuse, or threaten others.
  • Falsely obtaining electronic services or data without payment of required charges.
  • Knowingly accessing a computer or network without the effective consent of the owner.
  • Accessing, copying, transporting (to another person or location), modifying, or destroying programs, records, or data belonging to TCU or another user without authorization, whether such data is in transit or storage.
  • Physical theft, relocation, modification, or damage to any TCU computer or network equipment, facilities, or property. This includes all computer labs, network hubs, wiring, ports and links.