The University expects that all persons who make any use of University computing hardware, software, networking services, or any property related or ancillary to the use of these facilities, will abide by the following policy statement:
University information technology resources are provided in the hope that the whole university community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.
All hardware, software, and related services supplied by the University are for the sole purpose of supplementing and reinforcing the University's goals as set forth in the student and faculty handbooks and other mission statements of the University. Misuse of these facilities is a violation of the Texas Computer Crimes Statute and possibly other laws as well. It is a specific violation to give account passwords to individuals who are not the owners of such accounts, or to obtain passwords to or use of accounts other than one's own.
We expect that no one will use hardware, software, or services without authorization to do so. Copying software is a violation of federal copyright law. Individuals may not extend their use of the facilities described above for any purpose beyond their intended use, nor beyond those activities sanctioned in University policy statements. In particular, no one may use them
Individuals who violate the aims of this policy will be subject to disciplinary action or to referral to law enforcement authorities. Information Technology Services personnel are authorized to monitor suspected violations and to examine items stored on any University storage medium by individuals suspected of violating this policy.