URP: I.19.r Computer & Software Acceptable Use Policy

Tags techurp

OVERVIEW

Texas Woman’s University is committed to providing rich, enabling technological resources that provide students, faculty and staff, with the freedom to create, collaborate, and communicate with colleagues both inside and outside of Texas Woman’s University. The University policies work to preserve the integrity of information resources, ensuring the contents of communications will not be tampered with, destroyed, stolen, and/or violated by misrepresentation. The University encourages access to knowledge and to share that information, therefore contributing to the University’s mission of instruction, research and service.

PURPOSE      

The information resources of the University are intended primarily for activities related to accessing, sharing and creating information, and collaborating with other members of this and other communities for scholarly and work-related communications.  Secondarily, they are intended for use to enhance community service.

Under the provisions of the Information Resources Management Act, Information Resources are strategic assets of the State of Texas that must be managed as valuable state resources.  Thus, this policy is established to achieve the following:

  • To ensure compliance with applicable statutes, regulations, and mandates regarding the management of information resources.                                
  • To establish prudent and acceptable practices regarding the use of information resources.                         
  • To educate individuals who may use information resources with respect to their responsibilities associated with such use.

SCOPE

The Texas Woman’s University (TWU) Acceptable Use Policy applies equally to all individuals granted access privileges to any TWU Information Resources.  This policy is applicable to any member of the University community, whether at the University or elsewhere, and refers to all information resources whether individually controlled, shared, stand alone, or networked.

 

Information resources in this document are meant to include any information in electronic, digital, or audiovisual format  and any hardware or software that store and use such information (i.e., electronic mail, local databases, externally accessed, CD-ROM, motion picture film, recorded magnetic media, photographs, digitized information, voice mail, faxes).

DEFINITIONS

Information Resources (IR):  Any and all computer printouts, online display devices, magnetic storage media, and all computer-related activities involving any device capable of receiving email, browsing Web sites, or otherwise capable of receiving, storing, managing, or transmitting electronic data including, but not limited to, mainframes, servers, personal computers, notebook computers, hand-held computers, personal digital assistant (PDA), pagers, distributed processing systems, network attached and computer controlled medical and laboratory equipment (i.e., embedded technology), telecommunication resources, network environments, telephones, fax machines, printers, and service bureaus.  Additionally, IR includes the procedures, equipment, facilities, software, and data that are designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display, and transmit information.

Information Resource Manager (IRM):  Responsible to the State of Texas for management of the agency’s information resources.  The designation of an agency information resources manager is intended to establish clear accountability for setting policy for information resources management activities, provide for greater coordination of the state agency’s information activities, and ensure greater visibility of such activities within and between state agencies.  The IRM has been given the authority and the accountability by the State of Texas to implement Security Policies, Procedures, Practice Standards, and Guidelines to protect the Information Resources of the agency.  If an agency does not designate an IRM, the title defaults to the agency’s Executive Director, and the Executive Director is responsible for adhering to the duties and requirements of an IRM.

Information Security Officer (ISO):  Responsible to the executive management for administering the information security function within the agency.  The ISO is the agency’s internal and external point of contact for all information security matters.

System Administrator (sysadmin):   Is a person employed to maintain and operate a computer system and/or network and are usually members of an information technology department.  Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems.  Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of the technical support staff.  A System Administrator must demonstrate a blend of technical skills and responsibility.

Technical Support (or tech support):  Is a range of services providing assistance with technology products such as computers, televisions, mobile phones, or other electronic or mechanical goods.  In general, technical support services attempt to help the user solve specific problems with a product – rather than providing training, customization, or other support services.  Larger organizations frequently have internal technical support available to their staff for computer related problems.  Technical support may be delivered by different technologies, depending on the situation.  For example, direct questions can be addressed using text, email, or through a ticketing system.  Basic software problems can be addressed over the telephone or by remote support, while more complicated problems with equipment may need to be dealt with in person.

Data Owner: Permission given to an individual who can authorize or deny access to certain data, and who is responsible for that data’s accuracy, integrity, and timeliness.

User:  An individual or automated application or process that is authorized access to the resource by the owner, in accordance with the owner’s procedures and rules.

POLICY

Users must report any weaknesses in TWU computer security, to include any incident of possible misuse or violation of this agreement to the proper authorities by contacting the appropriate management.

Users must not attempt to access any data or programs contained on TWU systems for which they do not have authorization or explicit consent.

Users must not share their TWU account(s), passwords, Personal Identification Numbers (PIN), Security Tokens (i.e. Smartcard), or any other information device used for identification and authorization purposes.  (to include your TWU voicemail security code)

Users must not make unauthorized copies of copyrighted software.

Users must not use non-standard shareware or freeware software without TWU’s Technology and Information Services’ approval unless it is on the TWU standard software list.

Users must not purposely engage in activity that may:  Harass, threaten, or abuse others; degrade the performance of Information Resources; deprive an authorized TWU user access to a TWU resource; obtain extra resources beyond those allocated; circumvent TWU computer security measures.

Users must not download, install or run security programs that reveal or exploit weaknesses in the security of a system.  For example, TWU users must not run password cracking programs, packet sniffers, or port scanners or any other non-approved programs on TWU Information Resources.

Users of TWU Information Resources must not use them for personal benefit.

Users must not intentionally access, create, store, or transmit material which TWU may deem offensive, indecent or obscene (other than in the course of academic research where this aspect of the research has the explicit approval of the TWU official processes for dealing with academic ethical issues).

Access to the Internet from a TWU-owned, home-based computer must adhere to all the same policies that apply to use from within TWU facilities.  Employees must not allow family members or other non-employees to access TWU computer systems.

Users must not otherwise engage in acts against the aims and purposes of TWU as specified in its governing documents or in rules, regulations and procedures adopted from time to time.

 

 

USER RESPONSIBILITIES

When you use the technology resources at Texas Woman’s University, you accept the specific responsibilities as follows:

Respect the privacy of other users (i.e.,  you shall not intentionally seek information on, obtain copies of, or modify files, tapes, or passwords belonging to other users of the University; shall not represent others, unless authorized to do so explicitly by those users; nor shall you divulge sensitive personal data to which you have access concerning students, faculty, or staff, without explicit authorization to do so.)

Respect the rights of other users (i.e.,  you shall comply with all University policies regarding sexual, racial, and/or harassment.)

Respect the legal protection provided by copyright and licensing of programs, data, and intellectual property (i.e.,  you shall not make copies of a licensed computer program to avoid paying additional license fees, to share with other users, or to reproduce, in any form, protected works.)

Respect the intended usage of resources (i.e.,  you shall only use those resources assigned to you by the University for the purposes specified and shall not access or use other such resources unless explicitly authorized to do so by the appropriate vice president.) **Additionally, you may not use University resources assigned to you or others for profit-making or fundraising**

Respect the intended usage of systems for electronic exchange (i.e.,  you shall not send forged email/voice mail or chain mail that can interfere with the efficiency of the system.  Also, you shall not break into another user’s email/voice mail box or read/listen to someone else’s electronic mail without that individual’s explicit verbal or written permission).

Respect the integrity of the system or network (i.e.,  you shall not intentionally develop or use programs, transactions, data, or processes that harass other users or infiltrate the system or damage or alter the software or data components of a system.  Alterations to any system or network software or data component shall be made only under specific instructions from Information Technology.)

Adhere to all general University policies and procedures including, but not limited to, policies on proper use of information resources, information technology and networks; acquisition, use and disposal of University-owned property; use of telecommunications equipment; ethical and legal use of software; and ethical and legal use of administrative data.

Complete and pass a Basic Security Awareness Course upon assignment to TWU and an Annual Refresher Course each year of employment.

The Information Technology (I.T.) staff members are not responsible for policing user activity.  However, when made aware of violations, either through the normal course of duty or by a complaint, it is the I.T. responsibility to initiate an investigation.  At the same time, in order to forestall an immediate threat to the security of the system or its users, the I.T. staff may suspend the user’s account privileges while the incident is being investigated.  They may also take other actions to preserve the state of files and other information relevant to an investigation.  Information Technology does not monitor email traffic or retain email messages.

Information Technology acts in accordance with existing policy governing privacy of user information by seeking permission to examine the content of email and other private files.  In instances where user permission cannot be obtained and the content of files or email may jeopardize the security of systems, safety of users, or ability of the University or its constituent parts to conduct necessary business, I.T. must obtain authorization from executive level authority to examine the contents of the user’s account.

INCIDENTAL USE

As a convenience to the TWU user community, incidental use of information resources is permitted.  The following restrictions apply:

  • Incidental personal use of electronic mail, internet access, fax machines, printers, copiers, and so on, is restricted to TWU approved users.  It does not extend to family members or other acquaintances.
  • Incidental use must not result in direct costs to TWU.
  • Incidental use must not interfere with the normal performance of an employee’s work duties.
  • No files or documents may be sent or received that may cause legal action or embarrassment to TWU.
  • Storage of personal email messages, voice messages, files and documents contained within TWU’s information resources must be nominal.
  • All messages, files and documents including personal messages, files and documents located on TWU information resources are owned by TWU and may be subject to open records requests.  Requests may be accessed in accordance with this policy.

USE OF COMPUTING RESOURCES

All Texas Woman’s University computing and networking resources should be used in an effective, efficient, ethical, and legal manner.  This statement applies to microcomputer, mainframe computer, or computer network use.  It also applies to computer files, programs, or data stored on floppy disk, hard disk, magnetic tape, flash drive, or other storage media.  Computer facilities and files owned by others should be used or accessed only with the owner’s permission.  Viewing or using another person’s computer files, programs, or data without authorized permission is unethical behavior and an invasion of that person’s privacy.  Such behavior, if used for personal gain, is plagiarism.  Ethical standards apply even when material appears to be legally unprotected.

University computer facilities are a valuable, but finite, resource for University use and must be conserved.  Users must properly utilize these resources to minimize any impact on the work of others.  Game playing is not allowed on Texas Woman’s University systems. 

Sending, receiving or displaying obscene, harassing, or pornographic material via any electronic mail or bulletin board facility either on campus or through the internet is strictly forbidden.  Unofficial campus-wide emails and any message of commercial or political nature are also forbidden.  Violations may result in progressive disciplinary actions that include termination of computer use privileges, expulsion from the University, termination of employment, or legal action.

Texas Woman’s University will not install any software or hardware on a personal computer not owned by Texas Woman’s University.  TWU will not provide technical assistance on non-university machines for computer problems and will not be responsible for repairing, replacing, or installing any hardware component or peripheral.  TWU will not be responsible for any payment relating to consequential damages resulting from the installation or configuration of a network interface card and/or the configuration of any personal computer not owned by Texas Woman’s University for use on the University network.

LEGAL/ETHICAL USE OF SOFTWARE AND DIGITAL MATERIAL

Texas Woman’s University forbids, under any circumstances, the unauthorized reproduction of software or the use of illegally obtained software.  Using University equipment to make illegal copies of software is prohibited.  University employees and students who violate this policy are subject to disciplinary action.  Individuals who violate U.S. copyright law and software licensing agreements also may be subject to criminal or civil action by the owner of the copyright.

TWU, along with many other colleges and universities, supports the following statement from the EDUCOM Code, Using Software, distributed by EDUCOM, a non-profit consortium of colleges and universities:

Respect for intellectual labor and creativity is vital to academic discourse and enterprise.  This principle applies to works of all authors and publishers in all media.  It encompasses respect for the right to acknowledgement, right to privacy and right to determine the form, manner and terms of publication and distribution.

Because electronic information is volatile and easily reproduced, respect for the work and personal expression of the others is especially critical in computer environments.  Violations of authorial integrity, including plagiarism, invasion of privacy, unauthorized access, trade secret, and copyright violations, may be grounds for sanctions against members of the academic community.

Texas Woman’s University prohibits the use of its network for the unauthorized duplication, use, or distribution of copyrighted digital materials, regardless of the method employed (e.g., web pages, peer-to-peer (P2P) file sharing, email, etc.). You must have fair use rights or authorization from the copyright holder for any material you use, make available, or share over the campus network. 

Software programs are protected by Section 117 of the 1976 Copyright Act.  Most TWU software is protected by federal copyright laws.  Educational Institutions are not exempt from these laws.  Software is also protected by the license agreement between supplier and purchaser.  Software provided by TWU can only be used on the computer equipment specified in the software license.  It is against University policy to copy or reproduce any licensed software on University computing equipment, except as expressly permitted by the software license.

PRIVACY STATEMENT

The contents of communication across the TWU network are considered private to the fullest extent permitted by law.  Ordinarily, access to user’s accounts and files require permission of the sender/recipient of the message or owner of the file (the person to whom the account ID is assigned).  In the event of a University investigation for alleged misconduct, the contents of the account may be locked or copied to prevent destruction and loss of information and would require executive-level approval to view.

 

Since University resources are being used to create and store files, users should understand that the University must assign certain individuals responsibility for maintaining, repairing, and further developing those resources.  In the normal course of doing their assigned work, some individuals, by virtue of their positions within the University and their specific responsibilities, may have special access privileges to hardware and software and therefore, to the content that resides in those resources.  The University will strive to protect individual privacy by ensuring that the number of individuals with this level of access is strictly limited and that individuals placed in those positions are selected for their judgment and ethics, as well as their technical expertise.

PRIVACY – OWNERSHIP OF ELECTRONIC FILES

Electronic files created, sent, received, or stored on Information Resources owned, leased, administered, or otherwise under the custody and control of TWU, are the property of TWU.

This information is not private and may be accessed by TWU I.T. employees at any time without the user’s knowledge.  Electronic file content may be accessed by appropriate personnel in accordance with the provisions and safeguards provided in the Texas Administrative Code 202, Information Resource Standards.

SECURITY

Users of TWU computing resources are expected to act responsibly to maintain the security of information stored on computing systems.  In particular, computer passwords, account names and other types of authorization assigned to an individual user must be safeguarded and not shared with others.  Microcomputer users must take the necessary steps to protect their systems from computer viruses and other destructive computer programs.  Each user should understand the level of file protection required by each computer system.  Each department must determine and implement appropriate backup procedures, as necessary, to be followed to protect critical and sensitive information from loss.

All personnel are responsible for managing their use of Information Resources (IR) and are accountable for their actions relating to IR security.  Personnel are also equally responsible for reporting any suspected or confirmed violations of this policy to the appropriate management.

The use of IR must be for officially authorized business purposes only.  There is no guarantee of personal privacy or access to tools such as, but not limited to:  email, web browsing, and other electronic discussion tools.  The use of these electronic communication tools may be monitored to fulfill complaint or investigation requirements.  Departments responsible for the custody and operation of computers (custodian departments) shall be responsible for proper authorization of IR utilization, the establishment of effective use, and reporting of performance to management.

Any data used in an IR system must be kept confidential and secure by the user.  The fact that these data may be stored electronically does not change the requirement to keep the information confidential and secure.  Rather, the type of information or the information itself is the basis for determining whether the data must kept confidential and secure.  Regardless of whether or not data is stored in a paper or electronic format, or is copied, printed, or electronically transmitted, these data must still be protected as confidential and secured.

All computer software programs, applications, source code, object code, documentation, and data shall be guarded and protected as if it were state property.

Departments must provide adequate access controls in order to monitor systems to protect data and programs from misuse in accordance with the needs defined by owner departments.  Access must be properly documented, authorized and controlled by each department’s Data Owner or designated Data Custodian.

All commercial software used on computer systems must be supported by a software license agreement that specifically describes the usage rights and restrictions of the product.  Personnel must abide by all license agreements and must not illegally copy licensed software.  The IRM through I.T. reserves the right to remove any unlicensed software from any computer system.

The IRM through I.T. reserves the right to remove any non-business related software or files from any system.  (e.g.,  games, instant messengers, pop email, music files, image files, freeware, and shareware.)

This site has security measures in place to protect from loss, misuse, and alteration of the information under the control of Texas Woman’s University.

ACADEMIC FREEDOM RELATED TO ELECTRONIC COMMUNICATION

An important part of the identity of TWU is recognizing the need for personal expressions and insights by members of the campus community.  The uses of the University’s information resources infrastructure, both within the university and beyond, provide a vehicle for those expressions and insights.  The use of electronic communication requires all users to act responsibly and professionally.

A faculty member should be free from institutional censorship or discipline, but each faculty member’s position in the university community implies special obligations.  The public may judge the profession and the institution by the faculty member’s communications.  (i.e., web page).  The faculty member’s obligations include:  maintaining accuracy and currency of information at all times, exercising appropriate constraint, respecting the opinion of others, and stating clearly that they do not speak for the institution.  These obligations exist in all communications, but are especially important with the global accessibility of electronic communications.

RISK MANAGEMENT

The TWU administration adopted risk management guidelines in compliance with the Texas Administrative Code to identify and to set up technical and procedural mechanisms to make the information technology environment at TWU and its internal and external networks resistant to disruption and unauthorized access.  Therefore, all technology related purchases for TWU must undergo a risk assessment prior to purchase.  The TWU Department of Technology and Information Services will consult with departments looking to purchase software to ensure ADA compliance.  The risk assessment would also review network access, as directed by TAC 206 and 213, along with security requirements, as directed by TAC 202.  The integrity of this resource is the responsibility of its users who must all guard against abuses that disrupt and/or threaten the long-term viability of the Information Technology systems at the University and those beyond the University.  Access to the information technology systems at the University is provided as a privilege and must be treated as such by all users of these systems.  The use of the University’s systems constitutes acceptance of this policy, its inherent responsibilities, relevant laws, contractual obligations, and the highest standard of ethics.

SOCIAL USE STATEMENT

Open communication within a diverse institution is critical to building a sense of community.  Members of the community also strive for the most responsible use of the institutional resources.  Therefore, limiting the number of purely personal communications is appropriate and reasonable.  Users at Texas Woman’s University are encouraged to use the communication resources primarily for purposes related to accessing, sharing, creating information, and collaborating with other members of this and other communities for scholarly and work-related communications.  Secondarily, they are intended for use to enhance community service.  Occasional and incidental social communications are not disallowed by this policy; however, each user should comply with specific policies of their individual units.

A supervisor concerned about an employee’s potential violation of this policy (9.01) should consider the following:

  • Review whether or not standards and expectations in this area have been well-communicated and made clear to the employee;
  • Pursue direct communication with the employee regarding the issue; and
  • Proceed as one would handle any personnel-related disciplinary action.

COMPUTER LAB USE

Access to the information resource infrastructure both within the University and beyond the campus, is for sharing information and for maintaining the security of the intellectual products of the academic community.  All require that each and every user accept responsibility to protect the rights of other users.  Any member of the University community who, without authorization, accesses, uses, destroys, alters, dismantles, or disfigures the University information resources, properties or facilities, including those owned by third parties, thereby threatens the atmosphere of increased access and sharing of information.  It also threatens the security within which members of the community may create intellectual products by maintaining records and engaging in unethical and unacceptable conduct.  Access to the information technology systems at the University is provided as a privilege and must be treated as such by all users of these systems.  Members of the University community should strive for the most responsible use of the institution’s resources.  Users accept the responsibility to:

  • Respect the legal protection provided by copyright and licensing of programs and date;  
  • Respect the privacy and rights of other users; and
  • Respect the intended use of resources.

Information resources in this statement are meant to include any information in electronic or audiovisual format and the hardware/software that make storing that information possible.  (e.g.,  electronic mail, local databases, externally accessed, CD-ROM, motion picture film, recorded magnetic media, photographs, digitized information, voice mail, faxes).

WORLD WIDE WEB

The World Wide Web offers an excellent medium for personal expression; therefore, TWU allows students, faculty and staff to publish personal pages that are accessible through the University’s information resource infrastructure.  It is important that those viewing the information from outside the University recognize the difference between official and personal information.  Each personal web page must include a disclaimer with a link to the official full text disclaimer.

TWU claims no editorial control over material maintained in the individual accounts or personal pages of students, faculty, and staff.  TWU values and defends the right of free speech and the freedom of individuals to express themselves, providing such expression respects the laws of the civil and the university communities and responsibility for the expression is assumed by the individual.

It is encouraged that graphic and image use be evaluated for space allocation and accessibility.  Any image of an individual used in a web page requires a signed release form on file at the Office of Marketing and Communication.  For anyone under 18 years of age, this release must be signed by a parent or guardian.  Any protected work should not be used in a manner that violates copyright, patent protections, or license agreements.  Any protected creative work should not be used as a graphic image without an appropriately signed release.

The same copyright and trademark laws of the United States that govern illegal copies of copyrighted material or the use of trademarks apply to the use of these materials on the University’s web pages.  TWU is not responsible for any abuse of state and federal copyright or trademark laws that occur on personal web pages or unofficial sites.

INFORMATION COLLECTED, STORED LOGS AND NETWORK MONITORING

TWU maintains log files of all access to its site and also monitors network traffic for the purpose of site management and security.  This information is used to help diagnose problems with the servers and to carry out other administrative tasks.  Log analysis tools are also used to create summary statistics to determine which information is of the most interest to users, to identify system problem areas, or to help determine technical requirements.  The following information is collected in these files:

  • Hostname:  the hostname, site name, username, and IP address of the computer requesting access to the site
  • User-Agent:  the type of browser, its version, and the operating system of the computer requesting access
  • Referrer:  the web page the user came from
  • System date:  the date and time on the server at the time of access
  • Full request:  the exact request made by the user
  • Status:  the status code the server returned
  • Content length:  the size, in bytes, of the file sent to the user
  • Method:  the request method used by the borrower
  • Universal Resource Identifier (URI):  the location of the particular requested (aka URL)
  • Query String of the URI:  anything after a question mark in a URI. 
  • Protocol:  the technical protocol and version used (e.g.,  http, ftp)
  • Cookies:  a cookie is a small file containing information that is placed on a user’s computer by a web server.  Typically, these files are used to enhance the user’s experience of the site, to help users move between pages in a database, or to customize information for a user.  TWU servers do not store personally identifiable information in cookies from pages intended for use by the general public.  Information stored in cookies by TWU web servers is used for internal purposes only.  It is not used in any way that would disclose personally identifiable information to outside parties unless System Administration is required to do so.

The above information is not used in any way that would reveal personally identifying information to outside parties unless TWU is legally required to do so.  Web server logs are scheduled for regular destruction in accordance with the rules and regulations of the Texas State Library and Archives Commission.

INFORMATION COLLECTED BY EMAIL AND FORMS

TWU collects the email addresses of those individuals who communicate with us via email or who give us their email address.  TWU collects information that is voluntarily provided by those individuals who submit forms on our web site.  If a member of the general public sends TWU an email message or fills out a web-based form with a question or comment that contains personally identifying information, that information will only be used for the purposes for which the form is intended, to respond to the question or comment and to analyze trends.  The message or form may be redirected to another government agency or person who is better able to respond to the question or comment.  TWU does not market such information.  TWU does not use such information in any way that would reveal personally identifying information to outside parties unless legally required to do so.

DISICIPLINARY ACTIONS

Violation of this policy may result in disciplinary action, which may include termination for employees and temporaries; a termination of employment relations in the case of contractors or consultants; termination of access; legal action; termination for interns and volunteers; disciplinary review; suspension or expulsion (in the case of a student).  I.T. will, when necessary, work with other University offices such as the Department of Public Safety, disciplinary councils, General Counsel, and State and Federal officials in the resolution of problems and investigations.

Violations of any of the above guidelines are considered unethical and may be violations of University policy or criminal offenses.  Individuals are expected to report information concerning instances in which the above guidelines have been or are being violated.

The University characterizes the following as unethical, unacceptable, and just cause for taking disciplinary action up to and including non-reappointment, termination of employement, and/or legal action for any activity through which an individual:

  • Violates such matters as University or third party copyright or patent protection and authorizations, as well as license agreements and other contracts;
  • Interferes with the intended use of the information resources;
  • Seeks to gain, or gains unauthorized access to information resources;
  • Without authorization, destroys, alters, dismantles, disfigures, prevents likely access to, or otherwise interferes with the integrity of computer-based information and/or information resources; and/or
  • Without authorization, invades the privacy of individuals or entities that are creators, authors, users, or subjects of the information resources.

SUPPORTING INFORMATION

(This Policy is supported by the following Policy Standard)

Information Laws and Practices

With few exceptions, you are entitled on your request to be informed about the information TWU collects about you.  Under sections 552.021 and 552.023 of the Texas Government Code, you are entitled to receive and review the information.  Under section 559.004 of the Texas Government Code, you are entitled to have TWU correct information about you that is held by us and incorrect.  The information that TWU collects will be retained and maintained as required by Texas records retention laws (sect 441.180 et seq. of the Texas Government code) and rules.

 

 

REFERENCES                            

Copyright Act of 1976

Foreign Corrupt Practices Act of 1977

Computer Fraud and Abuse Act of 1986

Computer Security Act of 1987

Health Insurance Portability and Accountability Act of 1996 (HIPPA)

The Digital Millennium Copyright Act of 1998

The State of Texas Information Act

Texas Government Code, Section 441

Texas Administrative Code, Chapter 202

Texas Administrative Code, Chapter 206

Texas Administrative Code, Chapter 213

IRM Act, 2054.075(b)

The State of Texas Penal Code, Chapters 33 and 33A

DIR Practices for Protecting Information Resources Assets

DIR Standards Review and Recommendations Publications

SANS

LINKS

(This page may contain links to other sites outside of Texas Woman’s University.  TWU is not responsible for the privacy practices or the content of such web sites.)

Peer-to-Peer (P2P) Distribution of Intellectual Property and Illegal Downloading

http://www.twu.edu/its/peer-to-peer-distribution-of-intellectual-property-and-illegal-downloading.asp

Copyright Laws of the United States  www.copyright.gov/title17/

If there are any questions about this privacy statement or the practices of this site, contact infosec@twu.edu

For dealings with this web site, contact webmaster@twu.edu

Details

Article ID: 65330
Created
Tue 10/16/18 4:56 PM
Modified
Tue 4/28/20 9:42 AM