|
|
Unauthorized use of UT Austin computer and networking resources is prohibited. If you log in, you acknowledge your awareness of and concurrence with the UT Austin Acceptable Use Policy. The university will prosecute violators to the full extent of the law. The university is not responsible for services provided by third parties authorized to use the university's authentication service. |
Last Modified April 22, 2006 |
Copyright © 1997-06 Information Technology Services |
The University of Texas at Austin | Privacy | Accessibility | Honor Code |