Acceptable Use Policy
The hardware and software that constitute Trinity's computing network are vital to the operation of the university. Inappropriate use of the network can detrimentally affect our ability to accomplish the institution's mission. Every user of the network has a responsibility to utilize these shared resources in an appropriate manner. The Acceptable Use Policy addresses that responsibility.
The Acceptable Use Policy applies to all users of the Trinity computing network.
Network users are expected to respect restrictions on authorized access to network information and resources. Violations of this policy include activities such as:Network users are expected to treat all network hardware with care and are expected to utilize all network resources in ways that respect the other network users. The following activities constitute violations of this policy: Discriminatory, demeaning, or abusive behavior may be subject to the University's Policy Statement on Harassment as described in the Faculty and Contract Handbook or the Student Conduct Polices on Respect for Self, Others, and the Community, Respect for Property, Personal Responsibility, or Harassment as described in the Student Handbook. Network users are expected to use systems for authorized purposes only. Violations include activities such as: advertising for a commercial organization, running a business, activities that violate state or federal law.
The Trinity computing network is the group of stations (computers, telephones, or other devices) owned or operated by Trinity University connected by communications facilities owned or operated by Trinity University for exchanging information. Connection can be permanent, via cable, or temporary, through telephone or other communications links. The transmission medium can be physical (e.g., fiber optic cable) or wireless (e.g.. satellite, wi-fi).