Administration

Home > Administration > Information Technology > Student use of Computer Resources

Student use of Computer Resources

All students must act responsibly and comply with local, state, and federal laws relating to copyright, security, and electronic media.

All students must make certain that their computer is secured against viruses, worms, hacker attacks, and other intrusions. Further, students are responsible for all uses of their computer and will be held accountable for network traffic originating at their computer or traced back to their computer's IP number (Internet address).

All students must be available on the Texas A&M University-Texarkana e-mail service and read e-mail in a timely manner. Faculty will send e-mail with important information about classes, and the administration, including the Office of Student Affairs and Enrollment Management, will send messages with timely, sometimes critical, announcements. These messages are sent to the “ace.tamut.edu” e-mail address assigned to each student.
Prohibited Activities

  1. A student shall not damage, destroy, misuse, or otherwise endanger the University’s computing and information resources. Specific violations of this standard include, but are not limited to:
  2. Using any University computer, facility, equipment, software, network, or other resource, including e-mail, for any activity other than that for which access or use was assigned or authorized;
  3. Using any University computer, facility, equipment, software, network, or other resource, including e-mail, for commercial use;
  4. Accessing any University computer, facility, equipment, software, network, or other resource, including e-mail, without authorization;
  5. Using any University computer, facility, equipment, software, network, or other resource, including e-mail, to commit or attempt to commit any other violation of this Code of Conduct;
  6. Disrupting, hindering, or damaging the service, use, or ability of others to access or use any University computer, facility, equipment, software, network, or other resource, including e-mail;
  7. Damaging, destroying, misusing, or otherwise harming any University computer, facility, equipment, software, network, or other resource, including e-mail; or
  8. Using any University computer, facility, equipment, software, network, or other resource, including e-mail, to commit or attempt to commit acts prohibited under applicable federal, state, or local laws.