Unauthorized use of UT Austin computer and networking resources is prohibited.
If you log in, you acknowledge your awareness of and concurrence with the
UT Austin Acceptable Use Policy. The university will prosecute violators
to the full extent of the law. The university is not responsible for services
provided by third parties authorized to use the university's authentication service.
|Last Modified July 11, 2009|
|Copyright © 1997-06 Information Technology Services|
|The University of Texas at Austin | Privacy | Accessibility | Honor Code|