Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program
Part 1: Use of U.T. Austin Property General Rules Assets owned by U.T. Austin are to be used for official state purposes only. Personal use of any University asset is normally prohibited. (ProCard, long distance telephone card, copy machines, and printers). Only authorized employees are allowed to drive University vehicles. Employees may not alter vehicles without U.T.’s permission.
Incidental Use Exception to the rule Q: Is it ever okay to use any U.T. Austin asset for personal reasons?
Incidental Use Exception to the rule Q: Is it ever okay to use any U.T. Austin asset for personal reasons? A: Yes. The occasional, incidental use of certain items, such as , the Internet, and telephones, is okay. Example of an acceptable use of telephone: A school calling in reference to a sick child.
Incidental Use Doesn’t apply to vehicles. Q: I have a need to use a U.T. Austin vehicle regularly. Occasionally I stop at the grocery while using the University’s vehicle. Is this okay?
Incidental Use Doesn’t apply to vehicles. Q: I have a need to use a U.T. Austin vehicle regularly. Occasionally I stop at the grocery while using the University’s vehicle. Is this okay? A: No. University vehicles are to be used for university business purposes only. You may not use a U.T. Austin vehicle to do personal errands.
What are my responsibilities? What are the rules and where do I find them? What about privacy? What other actions can I take? How I can find out more? Part 2: Computers Security and Acceptable Use
What are my responsibilities? Protect IT Resources from Physical and Electronic Access Secure you machine. Log off if you leave your computer. Select a good password. Keep your password secure. Control communications from your computer. Get help at
Only you can use your resources. Never reveal your personal password. You may not generate personal income by using any University-provided computing resource. Never do anything illegal, threatening, or deliberately destructive Be considerate. Acceptable Use Policy The Rules
Acceptable Use Policy More Rules Use resources appropriately. Never falsify or newsgroup postings. Be careful of copyright infringement. Never try to circumvent login procedures.
Acceptable Use Policy Other Rules You should not: Copy software without specific permission. Remove computers from campus w/o permission. Misuse U.T. Austin property to obtain a personal benefit or cause harm to another person. Other rules are found in U.T.’s Policy Memoranda. For more information, see
Copyright Infringement The University respects copyright protections. Licensed software may be copied only as permitted by the license. Employees may not use unauthorized copies. Any such use is without the consent of U.T. License agreements vary between software products.
Privacy Don’t think of your as private. Systems administrators may see content. Files may be subject to open records requests. Employee's privacy might be limited by evidence of fraud harassment, other illegal conduct, or violations of University rules.
Use virus detection software. Backup important files and store them in a safe place. Protect information. Report any breach of security to U.T.’s information resources immediately. Sign the U.T. Electronic ID Agreement. Take Action
How do I find out more? Read Responsible Use of Information Technology at Read Policy on Computer Security at Call the ITS Information Security Office at or write Ask your supervisor, or Call the Office of Institutional Compliance at
Review Your Knowledge The University of Texas at Austin General Compliance Training Program