Acceptable Use Policy
You must read, understand, and follow the UT System's Acceptable Use Policy (AUP).
Violations may result in termination of access, disciplinary review, expulsion, and possible legal action. If you receive notice of an AUP violation, follow the instructions in the notice or contact Information Technology as soon as possible.
Keep your computer safe from malware by following these guidelines.
- Keep your computer up-to-date. You should regularly check your operating system and anti-virus software for updates.
- Be careful where you click. Never open attachments or links from suspicious emails. Do not click on ads and do not install software you are not familiar with when browsing websites.
- Be careful who you let use your computer. Roommates, friends, and relatives may compromise your account or computer.
- Never share your usernames or passwords.
If you notice your computer is running slow or performing poorly, it may be infected with malware. Contact IT to find the best solution for you.
Users are expected to report any information concerning instances in which they suspect or have evidence that the acceptable use principles have been or are being violated. If at any time a user receives an electronic communication that places the user in peril or leads the user to believe that a criminal act may be pending, the user should immediately report the matter to the UTC Campus Police (423) 425-4357 or local authorities.
Reports about suspected violations of these principles should be directed to [email protected]. Spam e-mail may be forwarded and reported to s[email protected]. Receipt of incident reports will be acknowledged and investigated in a timely manner.
When a complaint of possible system or account misuse is reported to the University, the validity of the incident will be investigated per standard operating procedures. Any incidents that appear to be valid are forwarded to the appropriate UTC office with all supporting documentation or evidence gathered for investigation and resolution. A final report describing the outcome(s) of each such investigation will be prepared for the UTC Security Committee.