Chapter 3: Student Affairs
- Users shall obtain proper authorization before using TBR or Northeast State information technology resources.
- Users shall not use TBR or Northeast State information technology resources for purposes beyond those for which they are authorized.
- Users shall not share access privileges (account numbers and passwords) with persons who are not authorized to use them.
- Users shall not use TBR or Northeast State information technology resources in an attempt to access or to actually access computers external to the TBR or Northeast State system when that access is not authorized by the computer’s owner (no “hacking” allowed).
Back to Top
|Divisional Review Responsibilities Checklist: Information Technology|
Revision History: April 2014