Go to USC home page USC Logo University Technology Services
RSS Feed Twitter Facebook
1244 Blossom St.
Office Hours:
M-F 8:30 a.m. - 5 p.m.

Service Desk Hours:
M-F 8 a.m. - 6 p.m.

iCARE Center Hours:
M-F 8:30 a.m. - 5 p.m.

GET HELP!






Network Guidelines for Responsible Computing

Welcome to the University of South Carolina. Joining the community of scholars at the University grants you the privilege of using a wide variety of computing resources. These guidelines are provided to familiarize you with the basic responsibilities of being a good "electronic" citizen.

The guidelines included here highlight some specific behaviors related to computing, but responsible use is based on the Carolinian Creed:

  • I will practice personal and academic integrity;
  • I will respect the dignity of all persons;
  • I will respect the rights and property of others;
  • I will discourage bigotry, while striving to learn from differences in people, ideas, and opinions;
  • I will demonstrate concern for others, their feelings, and their need for conditions which support their work and development.
Members of the USC community are expected to obey all federal, state, and local laws, as well as University policies and procedures.

These guidelines apply to you whether you are using University computers or are using your personal computer equipment while associated with the University.

Following are the guidelines in brief. Click on any guideline to go a more detailed explanation of each.

Guidelines in Brief

Reporting Violations
If you suspect your account has been compromised, or you feel you have been violated by others, please keep copies of all relevant electronic documents and contact the UTS Service Desk at 777-1800 as quickly as possible, or email UTS Information Security at security@sc.edu. University Technology Services will work with appropriate University officials to resolve any reported violations.

Consequences of Computing Abuse
Abuse of University computing systems and inappropriate electronic actions by members of the University community can result in the loss of computing privileges, initiation of legal action by the University, and/or appropriate disciplinary action.

More University Computing Policies
For related policies related to computing and student conduct, refer to the University policies website: http://www.sc.edu/policies/index.shtml

University Policy IT 1.06 specifically addresses Acceptable Use of Information Technology. Click here for the .pdf.

General Questions about Computing
Information on applying for University internet/email accounts, computer training, and general information on computing at the University are available from University Technology Services. Visit our FAQ page, or contact the UTS Service Desk at (803)777-1800, or via email at servicedesk@sc.edu.


GUIDELINES IN DETAIL

Authorized Access

  • Only authorized users are allowed access to University computing resources.
  • You are responsible for any activity from your account. Do not let others use your account. Never give your password to anyone else.
  • Do not leave an active session unattended; always log off when you've completed your work.
  • Do not represent yourself as anyone else in email correspondence or web documents; do not imply you represent the University.

Privacy

  • University computing systems maintain strict safeguards to protect your privacy. Your accounts and files, however, can be compromised if you are lax in your gatekeeping!
  • Choose a password that will be easy for you to remember, but impossible for others to guess (a mix of letters and numbers is best, and steer clear of any word found in a dictionary). For example, the first letter of each word in an easy-to-remember phrase (Jane's going to France next semester - jg2fns) is a good choice. Change your password regularly!
  • Be advised that electronic mail should never be considered a completely secure means of communication. If your mail is addressed incorrectly it can end up in the hands of email administrators (best case) or unscrupulous others (worst case). Remember that FORWARD is a built-in function of all electronic mail packages - anyone can easily forward your message to others. Never send anything via email you would mind seeing on the evening news!

Harassment

  • It is against the law and University policy to harass someone through email. Harassment is not tolerated in any form. The University gives full support to investigations of messages described as obscene, harassing, and/or threatening. Do not send or forward harassing, fraudulent, obscene, threatening, or defamatory messages or materials to anyone.

Other Legalities

  • Copyright, obscenity, libel, and other laws governing communication and publication apply to electronic media as well: communications that would be illegal or that would violate University policy in the "off line" world are equally illegal or in violation of University policy when they occur online.

Reasonable Use of Resources

  • University resources should be used with discretion and with respect for others. University resources are shared, and should not be monopolized or used for personal gain.
  • Commercial use and profit-making ventures are not permitted. Junk mail, spamming, chain letters, and sales pitches are forbidden.
  • Copying or distributing proprietary software is forbidden.
  • Plagiarism standards also apply to electronic media; do not copy without permission or misrepresent others' ideas, images, or words as your own.
  • Respect University equipment and systems.
  • Use virus protection software (free copies are available from University Technology Services) to protect yourself and others from possibly malicious computer viruses.
  • When transferring files via electronic mail, limit the size to approximately half-a-megabyte (this is approximately 100 pages of text); larger files can cause traffic problems and may be rejected by many email systems.
  • Obtain other's permission before forwarding mail sent to you in confidence.
  • Regularly delete files and email messages you no longer need to save system resources.
  • If including email attachments, be sure your recipient can use the file format you send; not all formats are portable.
  • Be courteous and careful when sending email. Sign your messages and include a subject. Proof your messages carefully to be sure they are addressed to the appropriate person(s) and are in an appropriate tone. Mail composed in haste can seem terse and offensive; a few moments rereading a message can save you embarrassment and difficulties later.
Back to top
 
Safety/Emergency Information Directory: Find People        Map: Find Places        Calendar: Find Events        VIP        my.sc.edu Contact and Site Information
Columbia, SC 29208 • 803-777-1800 • Webmaster © University of South Carolina Board of Trustees