Keep your computer safe from viruses and spyware by following these guidelines.
- Keep your operating system updated. (This applies to both Windows based computers and Mac OS based computers.)
- Have an up-to-date antivirus program.
- Be careful where you click. Never open e-mail attachments you weren't expecting. Don't click on pop-up ads or install things you don't really need. (For information about phishing.)
- Run spyware removers/blockers regularly.
- Avoid P2P file sharing. Almost all "free" music and file-sharing applications install spyware and viruses.
- Be careful who you let use your computer. Roommates, friends, and relatives may click or install things they shouldn't.
- Don't share your user names or passwords with anyone.
If your computer is working poorly, it's probably infected. Call Client Services to find the best solution for you. If necessary, you can make an appointment to bring your PC to us so we can guide you through the reformat or disinfection process. You should plan to be present with the computer and be an active participant in the process, which typically takes around two hours.
Users are expected to report any information concerning instances in which they suspect or have evidence that the acceptable use principles have been or are being violated. If at any time a user receives an electronic communication that places the user in peril or leads the user to believe that a criminal act may be pending, the user should immediately report the matter to the UTC Campus Police (423) 425-4357 or local authorities.
Reports about suspected violations of these principles should be directed to [email protected] or [email protected]. Spam e-mail may be forwarded and reported to [email protected]. Receipt of incident reports will be acknowledged and investigated in a timely manner.
When a complaint of possible system or account misuse is reported to the University, the validity of the incident will be investigated per standard operating procedures. Any incidents that appear to be valid are forwarded to the appropriate UTC office with all supporting documentation or evidence gathered for investigation and resolution. A final report describing the outcome(s) of each such investigation will be prepared for the UTC Security Committee.