TIMES Setup Form

Set Up Form

Fields marked with an * are required
Employees, students, faculty, and volunteers that are new to TIMES will need to complete this form and certify their acceptance of the Code of Computing Ethics.
Classification *
Start Date *
End Date *

Keys Required

For any offices or labs you will need to access that do not have card readers.


Card Reader Access   

For any offices or labs you will need to access that have card readers.



Will you need a TIMES Account and Email Address? *
Will you need a Health1 Fourth floor locker?

Software Needed: Check applicable
Software

Grant Project Access: Research projects that you will be working on

Code of Computing Ethics TIMES Department users are subject to a high standard of computing ethics to insure the privacy and security of data. Because of this high standard, TIMES users are expected to adhere to a code of computing ethics. This standard of conduct is provided to all TIMES users, full time and part time, and is to inform users of their responsibilities with regard to computer security and privacy issues. These responsibilities include the user accounts and access as well as those of TIMES partners. Computing resources include mainframe computers, tablets, minicomputers, microcomputers, networks, software, data, computer rooms and computer-related supplies. Access to some University computing resources is controlled through the use of assigned accounts with an access ID. Details of obtaining an account can be obtained from the user's department or from the department supplying the computing resources. The standards of computing ethics for TIMES are:
  • A computer account is to be used only by the authorized user of the account.
  • Your computer account is to be used only to support the completion of your assigned duties as a TIMES user. Use of computing resources should be guided by University policies MAPP 10.03.01.
  • Account passwords: o The passwords for accounts, which are assigned to you, are not to be given to any other person. o You are responsible for changing your passwords in accordance with the security policies of UH.
  • In general, you will not request a customer to disclose his/her password to you. If the requested service is impossible to provide without the customers password, then the customer must change the password as soon as the TIMES employee has completed the requested service.
  • Restrictions associated with the computer account authorized for your use will be followed.
  • Sensitive data will be protected based on the nature of the data, as required by the most restrictive of any state or federal laws or university rules as it applies to the data.
  • Sensitive data will not be accessed, copied, or disseminated except to the extent necessary to fulfill assignments and responsibilities.
  • Programs, files, E-mail, or data belonging to others will not be accessed, altered, or copied without prior authorization from the owner. In general, this authorization must be in writing. Routine maintenance is exempted from this requirement. In most cases where system integrity is an issue, immediate intervention may be taken. Such intervention is to be limited in its scope and is to be reported to the appropriate department head / Dean as soon as practical.
  • In those cases where University Police, other police, or other appropriate agencies request access in conjunction with an investigation, the request should be in writing and reported to the University Information Technology (UIT) Security as well as the appropriate TIMES director as soon as practical.
  • Software license and copyright conditions:
    •  TIMES employees must be aware of and comply with software license and copyright conditions.
    • UH licenses software from a variety of companies. In general UH does not own this software or related documentation and, unless authorized by the software owner, does not have reproduction rights.
    • UH purchases software, or the right to use software, from a variety of companies. The copyrights for the software and documentation must be respected.
    • With regard to use on local area networks or on multiple machines, TIMES users shall use the software only in accordance with the license agreement.
    • TIMES users shall not be party to unauthorized use or copying software.
  • Information concerning subjects and their applications is to be treated as privileged information and will not be discussed except as necessary to perform your assigned duties.
  • Sensitive information on the security of operating system procedures will not be divulged to anyone without a demonstrated need-to-know.
TIMES users are cautioned that any violation of the computer ethics standards contained in this document may be grounds for disciplinary action. Depending on the seriousness of the violation such actions may include termination of employment, financial restitution for unauthorized use of services, and misdemeanor or felony charges in a court of law. Staff, faculty & students are expected to conduct themselves in accordance with the regulations and responsibilities as published in the UH policies.
Signatures & Approvals By checking the signature box below you are indicating the above information is true and correct to the best of your knowledge and that you have read the preceding User Code of Computing Ethics and understand the standards of conduct expected of you as a computing user of University of Houston. Approval request will be forwarded to your supervisor.
MonTueWedThuFriSatSun
242526272812345678910111213141516171819202122232425262728293031123456
MonTueWedThuFriSatSun
242526272812345678910111213141516171819202122232425262728293031123456