Welcome to the University of South Carolina. Joining the
community of scholars at the University grants you the privilege of using a
wide variety of computing resources. These guidelines are
provided to familiarize you with the basic responsibilities of
being a good "electronic" citizen.
The guidelines included here highlight some specific behaviors
related to computing, but responsible use is based on the
- I will practice personal and academic integrity;
- I will respect the dignity of all persons;
- I will respect the rights and property of others;
- I will discourage bigotry, while striving to learn from
differences in people, ideas, and opinions;
- I will demonstrate concern for others, their feelings, and
their need for conditions which support their work and
Members of the USC community are expected to obey all federal,
state, and local laws, as well as University policies and
These guidelines apply to you whether you are using University
computers or are using your personal computer equipment while
associated with the University.
Following are the guidelines in brief. Click on any guideline
to go a more detailed explanation of each.
If you suspect your account has been compromised, or you feel
you have been violated by others, please keep copies of all
relevant electronic documents and contact the UTS Service Desk at 777-1800 as quickly as possible, or email UTS Information Security at firstname.lastname@example.org. University Technology Services will
work with appropriate University officials to resolve any
Consequences of Computing Abuse
Abuse of University computing systems and inappropriate
electronic actions by members of the University community can
result in the loss of computing privileges, initiation of legal
action by the University, and/or appropriate disciplinary
More University Computing Policies
For related policies related to computing and student
conduct, refer to the University policies website:
University Policy IT 1.06 specifically addresses Acceptable Use of Information Technology. Click here for the .pdf.
General Questions about Computing
Information on applying for University internet/email
accounts, computer training, and general information on
computing at the University are available from University Technology Services. Visit our FAQ page, or contact the UTS Service Desk at (803)777-1800, or via email at email@example.com.
GUIDELINES IN DETAIL
- Only authorized users are allowed access to University
- You are responsible for any activity from your account. Do
not let others use your account.
Never give your password to anyone else.
- Do not leave an active session unattended; always log off
when you've completed your work.
- Do not represent yourself as anyone else in email
correspondence or web documents; do not imply you represent the
- University computing systems maintain strict safeguards to
protect your privacy. Your accounts and files, however, can be
compromised if you are lax in your gatekeeping!
- Choose a password that will be easy for you to remember, but
impossible for others to guess (a mix of letters and numbers is
best, and steer clear of any word found in a dictionary). For
example, the first letter of each word in an easy-to-remember
phrase (Jane's going to France next semester -
jg2fns) is a good
choice. Change your password regularly!
- Be advised that electronic mail
should never be considered a completely secure means of
communication. If your mail is addressed incorrectly it can
end up in the hands of email administrators (best case) or
unscrupulous others (worst case). Remember that
FORWARD is a built-in function
of all electronic mail packages - anyone can easily forward your
message to others. Never send
anything via email you would mind seeing on the evening news!
- It is against the law and University policy to harass someone
through email. Harassment is not
tolerated in any form. The University gives full support to
investigations of messages described as obscene, harassing,
and/or threatening. Do not send or forward harassing,
fraudulent, obscene, threatening, or defamatory messages or
materials to anyone.
- Copyright, obscenity, libel, and other laws governing
communication and publication apply to electronic media as well:
communications that would be illegal or that would violate
University policy in the "off line" world are equally illegal or
in violation of University policy when they occur online.
Reasonable Use of Resources
Back to top
University resources should be used with discretion and with
respect for others. University resources are shared, and
should not be monopolized or used for personal gain.
Commercial use and profit-making ventures are not permitted.
Junk mail, spamming, chain letters, and sales pitches are
Copying or distributing proprietary software is forbidden.
Plagiarism standards also apply to electronic media; do not
copy without permission or misrepresent others' ideas, images,
or words as your own.
Respect University equipment and systems.
Use virus protection software (free copies are available from
University Technology Services) to protect yourself and others from
possibly malicious computer viruses.
When transferring files via electronic mail, limit the size to
approximately half-a-megabyte (this is approximately 100 pages
of text); larger files can cause traffic problems and may be
rejected by many email systems.
Obtain other's permission before forwarding mail sent to you
Regularly delete files and email messages you no longer need
to save system resources.
If including email attachments, be sure your recipient can use
the file format you send; not all formats are portable.
Be courteous and careful when sending email. Sign your
messages and include a subject. Proof your messages carefully
to be sure they are addressed to the appropriate person(s) and
are in an appropriate tone. Mail composed in haste can seem
terse and offensive; a few moments rereading a message can
save you embarrassment and difficulties later.