The purpose of these guidelines is to outline the acceptable use of the TU Residential Network (ResNet).
Access to computing and network resources owned and operated by TU imposes certain
responsibilities and obligations and is granted subject to university policies, and
local, state, and federal laws. Acceptable use is ethical, reflects academic honesty,
and shows restraint in the consumption of shared resources. It demonstrates respect
for intellectual property, ownership of data, system security mechanisms, and individuals’
rights to privacy and to freedom from intimidation and harassment.
Access to the ResNet at TU is a privilege and must be treated as such by all users
of these systems. Each user must accept the responsibility for their actions and agree
to all parts of these guidelines.
No Personal Network Hardware Additions
- Campus network equipment and wiring may not be modified, tampered with or extended
for the purposes of redistributing ResNet access, wirelessly or wired.
- Personally-owned network devices (e.g., wireless access points, switches, routers,
etc.) are prohibited.
- Establishing a server of any kind is prohibited. Some examples are: FTP, Web Servers,
email servers, MP3, media servers or similar programs.
- Distribution of recorded, streamed or live TV or copyrighted video material is prohibited.
- Networked entertainment systems are permitted, however they may not act as a network
routing device or network server for the purposes of hosting games, data or video
to Internet based sources.
- The sole use of Webcams is for personal communications such as chats. All other use
No malicious activity
- Scanning for insecure, vulnerable computers on any network; using port scanners; or
using network probing software, including packet-sniffing software, is strictly prohibited.
This includes activity for class assignments on the university network and ResNet.
Your professor may offer suggestions for conducting such assigned activities OFF of
our campus networks.
- The use of hacking software and attempts to illegally connect to any other computer
system or device is prohibited.
- Users of ResNet shall not intentionally disrupt network activity, attack machines
on ResNet or the Internet, or capture private data of other users.
Adhere to Laws and Policies
- Users must comply with all federal, state and local laws and ordinances including
U.S. copyright laws. Illegal use and/or distribution of copyrighted materials such
as computer software and music is prohibited.
- Users shall not use their connection to harass abuse or threaten other users with
bodily harm, either on campus or across the Internet.
- Use of ResNet connections for commercial purposes, either for profit or non-profit,
- Users are responsible for all activities traced to their user ID or that originate
from their computer(s) or network devices. This includes guests.
- ResNet users must abide by the TU Acceptable Use and Information Technology Security
Adhere to Privacy and Personal Protection
- Users must keep their personal computers up-to-date with security patches and operating
- Users must protect their user ID and system from unauthorized use.
- Every computer connected to the ResNet must run anti-virus protection software with
up-to-date virus definitions.
- All email sent via the ResNet must accurately identify the sender. Sending anonymous
email or bulk, unsolicited email (SPAM) is prohibited.
- Use of equipment to receive unauthorized video services is prohibited.
- The ResNet is a shared resource. Network use or applications that inhibit or interfere
with the use of the network by others are prohibited. Users may be asked to cease
any system activity that directly or indirectly causes a problem on the network.
ResNet users connect to the network at their sole risk. TU will not be responsible
for damage to or loss of hardware, software or data stored on computers located on
the university property or connected to the network.
All suspected violations must be reported immediately to the proper authorities. For
alleged violations, contact the Information Security Office in the Office of Technology Services.
Anyone found to be in violation of these guidelines may face disciplinary action as
specified in the Student Handbook and applicable university policies and procedures.
Revocation or restriction of computer and network privileges is also possible. Offenders
also may be prosecuted under applicable local, state and federal laws. The Information
Security Officer reserves the right to audit computer and network systems on a periodic
basis to ensure compliance with these guidelines.