Acceptable Use Policy


The hardware and software that constitute Trinity's computing network are vital to the operation of the university. Inappropriate use of the network can detrimentally affect our ability to accomplish the institution's mission. Every user of the network has a responsibility to utilize these shared resources in an appropriate manner. The Acceptable Use Policy addresses that responsibility.


The Acceptable Use Policy applies to all users of the Trinity computing network.


Network users are expected to respect restrictions on authorized access to network information and resources. Violations of this policy include activities such as:

  • use of another user's password (with or without their knowledge)
  • sharing of one's own password with another user
  • employing either directly or by implication a false identity when using an account or other network resources
  • attempts to gain access to information or resources for which a user does not have explicit authorization
  • giving another individual the means to access data or resources they are not authorized to access
  • obtaining, possessing, using, or attempting to use passwords or other information about someone else's account
  • inspecting, modifying, distributing, or copying data, mail, messages, or software without proper authorization, or attempting to do so
  • tapping phone or data lines
  • accessing files by circumventing privacy or security restrictions
  • violations of copyright as in recording or taping of entertainment media without payment of fees or permission of copyright holder
  • Network users are expected to treat all network hardware with care and are expected to utilize all network resources in ways that respect the other network users. The following activities constitute violations of this policy:
  • damaging University hardware
  • introducing viruses
  • deliberately slowing a system
  • attempting to crash a system
  • Discriminatory, demeaning, or abusive behavior may be subject to the University's Policy Statement on Harassment as described in the Faculty and Contract Handbook or the Student Conduct Polices on Respect for Self, Others, and the Community, Respect for Property, Personal Responsibility, or Harassment as described in the Student Handbook. Network users are expected to use systems for authorized purposes only. Violations include activities such as: advertising for a commercial organization, running a business, activities that violate state or federal law.


    The Trinity computing network is the group of stations (computers, telephones, or other devices) owned or operated by Trinity University connected by communications facilities owned or operated by Trinity University for exchanging information. Connection can be permanent, via cable, or temporary, through telephone or other communications links. The transmission medium can be physical (e.g., fiber optic cable) or wireless (e.g.. satellite, wi-fi).