Policies

The following policy, rules, and conditions apply to everyone affiliated with The University of Tulsa

Ethics Code and Policy

Download the PDF

The following policy, rules, and conditions apply to all users of TU computer and telecommunication resources and services. Violations of this policy are unethical and possibly unlawful. In accordance with established University practices, violations may result in disciplinary action that could result in expulsion from the University or dismissal from a position, and/or legal action.

University Response to DMCA Notifications

Download the PDF

This policy is to insure that a consistent procedure is used to investigate and notify concerned parties of DMCA notices received by the University and alleging copyright infringement by students using the Internet.

Statutes Affecting Use Of Telecommunications

Download the PDF

This guideline provides "talking points" for the selected statutes that affect the use of communications including email and internet for Oklahoma.

Client Services Service Level Agreement for Desktop Computer Support

Download the PDF

The desktop Support Level Agreement applies to desktop hardware and desktop software that is in administrative units and managed by IS Client Services.

 

Computer Disposal Policy

Download the PDF

All surplus university owned computers, faxes, copy machines, cell phones, and other electronic equipment with printed circuit boards shall be recycled by the University's selected and approved vendor, Dell Computer Co. In addition, all computers or servers declared surplus that contain hard drives shall be wiped clean to at least DOD Level 3 or shall be destroyed by magnetic degaussing.

Dell will place a recycling charge on each quotation for all new computers ordered after June 1, 2005. Currently the charge is $15 per unit, with the CPU and monitor as separate units. This charge shall cover the recycling cost of all equipment currently in service.

Information Security Policy

Download the PDF

The objective of the University Information Security Policy is to foster and environment that will secure information within the Unversity of Tulsa community from threats against privacy, productivity, reputation, or intellectual property rights. The policy comprehensively applies to all individuals in the community and all forms of information resources.

What You Should Know About P2P File Sharing

Download the PDF

P2P file sharing applications such as Kazaa, Limewire and others have grown increasingly popular on college campuses. The primary application of these tools is to share copyrighted music and movies. Most users who engage in this activity are unaware, or do not fully appreciate, the legal and other risks involved. This document describes some of the hazards of using P2P applications and what you can do to protect yourself from these risks.

Review of Digitally Recorded Video

Download the PDF

The purpose of this policy is to ensure proper access and use of digitially recorded video. Digitally recorded video may be reviewed in the process of investigating an alleged specific criminal activity. A request to review digitally recorded video must be approved by the stated individuals in authority.

Installation of University Production Servers

Download the PDF

This policy applies to all University owned servers that will be used to provide mission critical services.

Any server that will reside on the University of Tulsa production network providing business and mission critical processes must have the server’s operating system installed by an University of Tulsa System Administrator.

Installation of Wireless Access Points

Download the PDF

The purpose of this policy is to insure the security and reliability of the University of Tulsa data network.

Only University provided access points that provide University services may be connected to the University of Tulsa data network. The wireless access point must be approved and installed by the Information Services Data Networking department.

Inappropriate Computer Usage Response

Download the PDF

This policy is to insure that a consistent procedure is used to investigate reports of suspected inappropriate computer usage. This policy applies to all reports of inappropriate computer usage on the University of Tulsa campus or originating from the campus network.

Personal Computers on the Campus Networks

Download the PDF

This purpose of this statement is to provide information on the campus network access and to recommend steps to take to minimize potential damage.

Personally Owned Computer

Download the PDF

This policy is to maintain a high quality of service and to limit liability by defining the scope of the Help DeskÂ’s role to service of university owned equipment. This policy applies to Students, Faculty, and Staff.

Computer Purchase and Service

Download the PDF

This purpose of this policy is to define standards and minimum configurations. This policy applies to Administrative Departments.

Perimeter Security Policy

Download the PDF

The purpose of this policy is to define the services that are allowed and the procedures for change requests.

Static IP Address

Download the PDF

This policy is to insure that a consistent procedure is used in evaluating the necessity of static IP addresses and the granting of their use. This policy applies to all requests for static IP addresses within the University.

Reporting Security Infractions

Download the PDF

The purpose of this policy is to inform all University of Tulsa employees of the appropriate reporting structure for suspicious or inappropriate computer usage. All allegations of suspicious or inappropriate computer usage will be investigated according to this established procedure.