The guidelines included here highlight some specific behaviors related to computing, but responsible use is based on the Carolinian Creed:
- I will practice personal and academic integrity;
- I will respect the dignity of all persons;
- I will respect the rights and property of others;
- I will discourage bigotry, while striving to learn from differences in people, ideas, and opinions;
- I will demonstrate concern for others, their feelings, and their need for conditions which support their work and development.
Members of the university community are expected to obey all federal, state, and local laws, as well as university policies and procedures.
These guidelines apply to you whether you are using university computers or are using your personal computer equipment on the university network.
Following are the guidelines in brief. Click on any guideline for a more detailed explanation.
If you suspect your account has been compromised, or you feel you have been violated by others, please keep copies of all relevant electronic documents and contact the UTS Service Desk at (803) 777-1800 as quickly as possible, or email the University Information Security Office at email@example.com. UTS will work with appropriate university officials to resolve reported violations.
Consequences of Computing Abuse
Abuse of university computing systems and inappropriate electronic actions by members of the university community can result in the loss of computing privileges, initiation of legal action by the university, and/or appropriate disciplinary action.
More University Computing Policies
For additional policies related to information technology, refer to the policies website at http://www.sc.edu/policies/index.shtml.