Section Menu

Summary of UT's Acceptable Use Policy (AUP)

You must read, understand, and follow UT System's Acceptable Use Policy (AUP). The following is not an all-inclusive list but rather a summary of common examples of AUP violations.

  • Disrupting network access for others, whether deliberately or unintentionally. Examples: infected computers flooding the network with spam or viruses, P2P file-sharing applications that consume more than a fair share of network resources, improperly configured network devices.
  • Using technology resources to violate any State or federal law including copyright and license agreements. Examples: illegally downloading, storing, and/or sharing copyrighted materials, viewing child pornography, theft of confidential information.
  • Transmitting abusive, threatening, or harassing messages, chain letters, spam, or other communications prohibited by law or University policy.
  • Unauthorized attempts to scan or gain access to systems, accounts, network traffic or information not intended for you.

Violations may result in termination of access, disciplinary review, expulsion, and possible legal action. If you receive notice of an AUP violation, follow the instructions in the notice or contact the UTC Computer Help Desk (helpdesk@utc.edu) at 425-4000 as soon as possible.

Safe Computing

Keep your computer safe from viruses and spyware by following these guidelines.

  • Keep your operating system updated. (For more information about updates, seehttp://itd.utc.edu/software/windows_updates.php or windowsupdate.microsoft.com (Windows) orhttp://itd.utc.edu/software/mac_updates.php (Mac).)
  • Have an up-to-date antivirus program.
  • Be careful where you click. Never open e-mail attachments you weren't expecting. Don't click on pop-up ads or install things you don't really need. (For information about phishing, seehttp://itd.utc.edu/security/phishing.php.)
  • Run spyware removers/blockers regularly.
  • Avoid P2P file sharing. Almost all "free" music and file-sharing applications install spyware and viruses.
  • Be careful who you let use your computer. Roommates, friends, and relatives may click or install things they shouldn't.
  • Don't share your user names or passwords with anyone.

If your computer is working poorly, it's probably infected. Call the UTC Help Desk at 425-4000. If necessary, you can make an appointment to bring your PC to the Help Desk in the UC Computer Lab where we will guide you through the reformat or disinfection process. You should plan to be present with the computer and be an active participant in the process, which typically takes around two hours.

Users are expected to report any information concerning instances in which they suspect or have evidence that the acceptable use principles have been or are being violated. If at any time a user receives an electronic communication that places the user in peril or leads the user to believe that a criminal act may be pending, the user should immediately report the matter to the UTC Campus Police(425-4357) or local authorities.

Reports about suspected violations of these principles should be directed to abuse@utc.edu or security@utc.edu. Spam e-mail may be forwarded and reported to abuse@messaging.microsoft.com. Receipt of incident reports will be acknowledged and investigated in a timely manner.

When a complaint of possible system or account misuse is reported to the University, the validity of the incident will be investigated per standard operating procedures. Any incidents that appear to be valid are forwarded to the appropriate UTC office with all supporting documentation or evidence gathered for investigation and resolution. A final report describing the outcome(s) of each such investigation will be prepared for the UTC Security Committee.

©