Access to university computing resources carries certain responsibilities for students, faculty and staff. This policy indicates responsibilities, examples of inappropriate behavior, consequences of violations and enforcement of violations.
Towson University Email Policy
The purpose of this policy is to set forth guidelines relating to the permissible use of the university's Electronic Mail System (Email).
Unwanted email that contains harassment, threats, vulgarity and/or pornography is strictly prohibited on any Towson University information system.
Wondering about the policy to send out a message to everyone on campus? Learn about it here.
Towson Tigers Today policies, procedures for submitting announcements, a list of authorized editors and sample submissions.
- Information Security
Handling Alleged Student Violations
This document indicates how to report an alleged student violation and the actions that may take place as a result of the violation.
Read a compilation of telephone policies, procedures and rates.
Mobile Computing Devices Policy
Mobile computing devices may be used on and off campus to access campus resources in the conduct of university business, at university expense, when approval is given.
A compilation of cellular telephone policies at Towson University.
How to request a university cell phone and procedures for business call reimbursements.
- Peer-To-Peer File Sharing
Peer-to-peer file sharing applications can be used to share a wide variety of information. The Office of Technology Services is committed to helping the campus community share information safely. For more information, please see the following pages:
Information and guidelines regarding use of Copyrighted content
This Student Computing Services site provides information, guidance and best practices regarding use of copyrighted works while connected to Towson University's network