Computer Use and Responsibilities
This document is based on the requirements stated in 21.01.03 Electronic Information Services Access and Security, 29.01.99.M2 Rules for Responsible Computing and annual compliance with the Information Systems Security Risk Assessment Report (ISAAC).
Access to University computer resources is a privilege and may be revoked from any user at any time, without notice, at the sole discretion of the University or other authorized representatives. Users that violate these policies, procedures, or laws are subject to disciplinary action including, but not limited to, those outlined in University policy.
Users should be aware that their use of University computing resources is not private. Although the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the university’s computing resources require the backup and caching of data and communication, the logging of activity, the monitoring of general usage patterns and other activities that are necessary for providing service. Individual computers can be accessed and activity monitored upon approval of an authorized campus official as per university policy.
To ensure the TAMUG system electronic information services are as secure as possible, various security management processes and procedures must be employed to eliminate the risk to various system information resources.
Here are a few that should be followed:
- Log out of or lock your computer when stepping away, even for a moment:
Forgetting to log out poses a security risk with any computer that is accessible to other people (including computers in public facilities, offices, and shared housing) because it leaves your account open to abuse. Someone could sit down at that computer and continue working from your account, doing damage to your files, retrieving personal information, or using your account to perform malicious actions. To avoid misuse by others, remember to log out of or lock your computer whenever you leave it.
- Protect passwords and use of accounts:
You are not permitted to share your accounts or passwords with others. If someone else has your password, your electronic life (email, personnel data, student accounts, financial accts, etc.) becomes available. You are at great risk of becoming the VICTIM! If at any time you feel that someone else has a password to one of your accounts, change it immediately. There is one exception to this rule, if there is a valid business reason for a another university employee to access a computer or account that you use, including but not limited to; if a you are unavailable, during an investigation or administrative inspection, if you are ill, are reported missing, take an extended vacation then an authorized representative may have the CIS department change the password to allow access to the required information. Normally this will be at the request of the user’s department head.
- Use the Bara (T) network drive to save shared documents:
This is a resource available through the network that documents may be saved for the ease of sharing documents among employees. It is very easy to use; it displays in My Computer as another drive, (T), for you to use. This is especially useful when a user is unavailable to get the important document that was due 5 o’clock yesterday. Please remember that this is NOT an approved location to backup your computer, documents and/or files. Anyone who uses this location to backup their computer will be asked to remove the backup files immediately. This drive is meant as a “Shared” location for interoffice or interdepartmental use only.
When planning a vacation, or if planning an extended leave of absence, please develop appropriate procedures for having someone else access the data, or software, on the computer assigned to you. Refer to step 3 above for documents. If email messages, contacts or calendar information from a particular account must be monitored, a delegate may be added to give permissions to access the email and calendar for you without having to have the password to your account and without having to access to your computer.
By receiving and using your Texas A&M University at Galveston account and password, you accept certain responsibilities and standards for computer use, which apply to all TAMUG computing resources.
The CIS Department is available to assist any campus member in their technological needs, be it a computer, network, email or any other technological device. To request assistance or report any issue with your equipment or any public computer equipment on campus, please contact the TAMUG Helpdesk at email@example.com or at 409.740.4480. The appropriate person will be assigned to assist you.
For More Information Contact:
HELPDESK at 409-740-4480 or x4480
CIS Front Desk at 409-740-4714 or x 4714
Report Broken Links