Computer Use, Responsibilities And Privacy    

This document is based on the requirements stated in Texas A&M System Policy 29.01.03  Information Security, 29.01.03.M0.02 Rules for Responsible Computing and annual compliance with the Information Technology Security Risk Assessment Report.

Access to University computer resources is a privilege and may be revoked from any user at any time, without notice, at the sole discretion of the University or other authorized representatives. Users that violate these policies, procedures, or laws are subject to disciplinary action including, but not limited to, those outlined in University policy.

Users should be aware that their use of University computing resources is not private, refer to 29.01.03.M0.09 Information Resources - Privacy. Although the University does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the university’s computing resources require the backup and caching of data and communication, the logging of activity, the monitoring of general usage patterns and other activities that are necessary for providing service. Individual computers can be accessed and activity monitored upon approval of an authorized campus official as per university policy.

To ensure the TAMUG system electronic information services are as secure as possible, various security management processes and procedures must be employed to eliminate the risk to various system information resources.

Here are a few that should be followed:

Always use your University issued computer for University business:
Your University computer has numerous security protections to safeguard any University data that may be saved on to the computer. Using your personal computer for University business is not approved or recommended. If you do not have a University issued computer please talk to your supervisor or Department Head about getting one. Also see our Bring Your Own Device  (BYOD) policy to understand the requirements and exception request process.

Log out of or lock your computer when stepping away, even for a moment:
Forgetting to log out poses a security risk with any computer that is accessible to other people (including computers in public facilities, offices, and shared housing) because it leaves your account open to abuse. Someone could sit down at that computer and continue working from your account, doing damage to your files, retrieving personal information, or using your account to perform malicious actions. To avoid misuse by others, remember to log out of or lock your computer whenever you leave it.

Protect passwords and use of accounts:
You are not permitted to share your accounts or passwords with others. If someone else has your password, your electronic life (email, personnel data, student accounts, financial accts, etc.) becomes available. You are at great risk of becoming the VICTIM! If at any time you feel that someone else has a password to one of your accounts, change it immediately. There is one exception to this rule, if there is a valid business reason for a another university employee to access a computer or account that you use, including but not limited to; if a you are unavailable, during an investigation or administrative inspection, if you are ill, are reported missing, take an extended vacation then an authorized representative may have the IS department change the password to allow access to the required information. Normally this will be at the request of the user’s department head.


By receiving and using your Texas A&M University at Galveston account and password, you accept certain responsibilities and standards for computer use, which apply to all TAMUG computing resources.

The IT Department is available to assist any campus member in their technological needs, be it a computer, network, email or any other technological device. To request assistance or report any issue with your equipment, please contact the TAMUG Helpdesk at helpdesk@tamug.edu or at 409.740.4714.