Rules of Behavior &
Acceptable Use Policy (AUP)
You must read, understand, and follow UT System's Acceptable Use Policy (AUP). The following is not an all-inclusive list but rather a summary of common examples of AUP violations.
- Disrupting network access for others, whether deliberately or unintentionally. Examples: infected computers flooding the network with spam or viruses, P2P file-sharing applications that consume more than a fair share of network resources, improperly configured network devices.
- Using technology resources to violate any State or federal law including copyright and license agreements. Examples: illegally downloading, storing, and/or sharing copyrighted materials, viewing child pornography, theft of confidential information.
- Transmitting abusive, threatening, or harassing messages, chain letters, spam, or other communications prohibited by law or University policy.
- Unauthorized attempts to scan or gain access to systems, accounts, network traffic or information not intended for you.
Violations may result in termination of access, disciplinary review, expulsion, and possible legal action. If you receive notice of an AUP violation, follow the instructions in the notice or contact Client Services as soon as possible.
Keep your computer safe from viruses and spyware by following these guidelines.
- Keep your operating system updated. (This applies to both Windows based computers and Mac OS based computers.)
- Have an up-to-date antivirus program.
- Be careful where you click. Never open e-mail attachments you weren't expecting. Don't click on pop-up ads or install things you don't really need. (For information about phishing, see http://www.utc.edu/information-technology/security/phishing.php.)
- Run spyware removers/blockers regularly.
- Avoid P2P file sharing. Almost all "free" music and file-sharing applications install spyware and viruses.
- Be careful who you let use your computer. Roommates, friends, and relatives may click or install things they shouldn't.
- Don't share your user names or passwords with anyone.
If your computer is working poorly, it's probably infected. Call Client Services to find the best solution for you. If necessary, you can make an appointment to bring your PC to us so we can guide you through the reformat or disinfection process. You should plan to be present with the computer and be an active participant in the process, which typically takes around two hours.
Users are expected to report any information concerning instances in which they suspect
or have evidence that the acceptable use principles have been or are being violated.
If at any time a user receives an electronic communication that places the user in
peril or leads the user to believe that a criminal act may be pending, the user should
immediately report the matter to the UTC Campus Police (423) 425-4357 or local authorities.
Reports about suspected violations of these principles should be directed to firstname.lastname@example.org or email@example.com. Spam e-mail may be forwarded and reported to firstname.lastname@example.org. Receipt of incident reports will be acknowledged and investigated in a timely manner.
When a complaint of possible system or account misuse is reported to the University, the validity of the incident will be investigated per standard operating procedures. Any incidents that appear to be valid are forwarded to the appropriate UTC office with all supporting documentation or evidence gathered for investigation and resolution. A final report describing the outcome(s) of each such investigation will be prepared for the UTC Security Committee.