ResNet Acceptable Use Standard

Purpose

The purpose of these guidelines is to outline the acceptable use of the TU Residential Network (ResNet).

Access to computing and network resources owned and operated by TU imposes certain responsibilities and obligations and is granted subject to university policies, and local, state, and federal laws. Acceptable use is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and to freedom from intimidation and harassment. 

Access to the ResNet at TU is a privilege and must be treated as such by all users of these systems. Each user must accept the responsibility for their actions and agree to all parts of these guidelines.

No Personal Network Hardware Additions

  • Campus network equipment and wiring may not be modified, tampered with or extended for the purposes of redistributing ResNet access, wirelessly or wired.
  • Personally-owned network devices (e.g., wireless access points, switches, routers, etc.) are prohibited.
  • Establishing a server of any kind is prohibited. Some examples are: FTP, Web Servers, email servers, MP3, media servers or similar programs.
  • Distribution of recorded, streamed or live TV or copyrighted video material is prohibited.
  • Networked entertainment systems are permitted, however they may not act as a network routing device or network server for the purposes of hosting games, data or video to Internet based sources.
  • The sole use of Webcams is for personal communications such as chats. Webcams are permitted for classroom use (i.e., Zoom). All other use is prohibited.

No malicious activity

  • Scanning for insecure, vulnerable computers on any network; using port scanners; or using network probing software, including packet-sniffing software, is strictly prohibited. This includes activity for class assignments on the university network and ResNet. Your professor may offer suggestions for conducting such assigned activities OFF of our campus networks.
  • The use of hacking software and attempts to illegally connect to any other computer system or device is prohibited.
  • Users of ResNet shall not intentionally disrupt network activity, attack machines on ResNet or the Internet, or capture private data of other users.

Adhere to Laws and Policies

  • Users must comply with all federal, state and local laws and ordinances including U.S. copyright laws. Illegal use and/or distribution of copyrighted materials such as computer software and music is prohibited.
  • Users shall not use their connection to harass abuse or threaten other users with bodily harm, either on campus or across the Internet.
  • Use of ResNet connections for commercial purposes, either for profit or non-profit, or mining of electronic currency purposes without written authorization from the university is prohibited.
  • Users are responsible for all activities traced to their user ID or that originate from their computer(s) or network devices. This includes guests.
  • ResNet users must abide by the TU Acceptable Use policy and Information Technology Security policy.

Adhere to Privacy and Personal Protection

  • Users must keep their personal computers up-to-date with security patches and operating system updates.
  • Users must protect their user ID and system from unauthorized use.
  • Every computer connected to the ResNet must run anti-virus protection software with up-to-date virus definitions.
  • All email sent via the ResNet must accurately identify the sender. Sending anonymous email or bulk, unsolicited email (SPAM) is prohibited.
  • Use of equipment to receive unauthorized video services is prohibited.
  • The ResNet is a shared resource. Network use or applications that inhibit or interfere with the use of the network by others are prohibited. Users may be asked to cease any system activity that directly or indirectly causes a problem on the network.

Disclaimer

ResNet users connect to the network at their sole risk. TU will not be responsible for damage to or loss of hardware, software or data stored on computers located on the university property or connected to the network.

Reporting Violations

All suspected violations must be reported immediately to the proper authorities. For alleged violations, contact the in the Office of Technology Services.

Enforcement

Anyone found to be in violation of these guidelines may face disciplinary action as specified in the Student Handbook and applicable university policies and procedures. Revocation or restriction of computer and network privileges is also possible. Offenders also may be prosecuted under applicable local, state and federal laws. The Chief Information Security Officer reserves the right to audit computer and network systems on a periodic basis to ensure compliance with these guidelines.