INFORMATION TECHNOLOGY

General Responsibilities for All Users

Use of any university computing resource serves as acceptance of UT's computing and security policies and practices.  Faculty, staff, physicians, and students agree to abide by the policies and procedures that govern the use of the University's automated information systems, and will accept the responsibility to protect information as described within FERPA, HIPAA, the Responsible Use of Information Technology, security policies and procedures of UT as well as other applicable federal and state laws.  Training opportunities should be taken advantage of as necessary in order to fully understand and fulfill these responsibilities.               

Violations of University policies and applicable state or federal laws are cited in University policies, handbooks, or other guides. Penalties for violations of the University policy range from loss of computer resource usage privileges to dismissal from the University; and, may also include prosecution, and/or civil action.

Last Updated: 6/27/22