Chilton IT supports the computer use policies established by the University of North Texas System and the State of Texas. Please review the UNT Computer Use policy and the UNT System IT Security Guidlines for specific information. Policies related to the Chilton Hall computer labs are highlighted below.

  • The University of North Texas provides each of its students, faculty and staff with one or more computer accounts (user-Ids) that permit use of the university's computer resources. Use of these resources is a privilege, not a right. When using these resources, individuals agree to abide by the applicable policies of the University, as well as federal, state and local laws. The University reserves the right at any time to limit, restrict or deny access to its computer resources, as well as to take disciplinary and/or legal action against anyone in violation of these policies and/or laws. 
  • Authorized Use: The University of North Texas provides computer resources for the purpose of accomplishing tasks related to the University's mission.
  • Students, including incoming students who have paid their fees, shall be allowed to use the University's computer resources for school-related and personal purposes, subject to this policy and other applicable University policies; state and federal law; and as long as personal use does not result in any additional costs to the University. Graduating students and students who leave the University for any reason will have their computer accounts terminated, except that, with the permission of the appropriate system administrator(s), continuing students enrolled for the coming fall semester may retain their computer account(s) during the summer.
  • Freedom of Expression: Censorship is not compatible with the goals of the University of North Texas. The University will not limit access to any information due to its content as long as it meets the standard of legality. The University does reserve the right, however, to place reasonable time, place and manner restrictions on freedom of expression on its computer systems.
  • Privacy: Users of the University's computer systems should be aware that computer use may be subject to review or disclosure in accordance with the Texas Public Information Act and other laws; administrative review of computer use for security purposes or in regard to a policy or legal compliance concern; computer system maintenance; audits and as otherwise required to protect the reasonable interests of the University and other users of the computer system. Anyone using the University's computer systems expressly consents to monitoring on the part of the University for these purposes and is advised that if such monitoring reveals possible evidence of criminal activity, University administration may provide that evidence to law enforcement officials. Further, all users should understand that the University is unable to guarantee the protection of electronic files, data or e-mails from unauthorized or inappropriate access.
  • Intellectual Property: All members of the University community should be aware that intellectual property laws extend to the electronic environment. Users should assume that works communicated through the computer network are subject to copyright laws, unless specifically stated otherwise.
  • A user shall use the University computer resources responsibly, respecting the needs of other computer users.
  • A user is responsible for any usage of his or her computer account. Users should maintain the secrecy of their password(s). 
  • When communicating with others via the University computer system, a user's communications should reflect high ethical standards, mutual respect and civility.