TKM College of Engineering provides campus network and computing facilities including internet access for the use of faculty, staff, students and other authorized individuals involved in research, academics and administrative purposes of the college.

TKMCE IT Usage Policy
  • 1. IT Policy Statement
  • 2. User Guidelines and Responsibilities
  • 3. Prohibited uses
  • 4. Intellectual Property , Licence and Restrictions
  • 5. Privacy
  • 6. Website Management Policy
  • 7. Electronic Waste Management
  • 8. Violation of Policy


This policy applies to all equipments that are owned or leased by TKMCE and also to any privately owned equipments that may be connected to the network services provided by TKMCE.

Applicability :
The College has extensive Information Technology resources and systems available for academic, research and administrative applications. Faculty, staff, and students are encouraged to become familiar with College technology resources and systems and to use them on a regular basis. Any access or use of IT resources that interferes, interrupts, or conflicts with these purposes is not acceptable and will be considered a violation of this Policy Statement. All users can access internet facility of the college only if they possess a valid user id and password issued by the Campus Networking Centre.


Users are expected to exercise responsible, ethical behavior when using these resources and to adhere to the following guidelines:

  • The Internet and associated resources contain a wide variety of material and information. Information available on the Internet is not generated or selected by The TKMCE’s IT CELL. The College is not responsible for the accuracy or quality of the information obtained through or stored on the campus network.
  • The creation, display or transmittal of illegal, malicious or obscene material is prohibited.
  • TKM College will not be liable for the actions of anyone connecting to the Internet through College facilities. All users shall assume full liability (legal, financial, or otherwise) for their actions.
  • The user is responsible for complying with laws protecting software or other accessed information. Downloading programs and files may violate copyright laws that protect information and software. Although the Internet provides easy access to software distributed by companies on a trial basis, this does not mean that the software is free or that it may be distributed freely. All files downloaded from a source external to the campus must be scanned for viruses.
  • Because of the insecure nature of transmitting files electronically, no right of privacy exists with regard to email, Internet sessions or electronic file storage and transmission. When sending or forwarding email over the campus network or the Internet, users shall identify themselves clearly and accurately. Anonymous or pseudonymous posting is expressly forbidden.



The College recognizes the common practice in computing, online or otherwise, involves use of a user name, login, Access ID, or screen name (collectively, user name) that may be different from the User’s legal name. Using someone else’s name or assuming someone else’s identity without appropriate authorization, however, is a violation of the college principles and this IT Policy. Accordingly, Users may not use the IT Resources under false name, identification, email address, signature or other medium of any person or entity without proper authorization.


When choosing a password for access to the IT Resources, or portions thereof, Users are expected to follow the best practices so as to prevent unauthorized access through any User’s password. Accordingly, Users should avoid using birth dates, names, telephone numbers, admission numbers, sequences etc.

  • Always use strong passwords, which follow the below listed rules :
    • 1. Your password must be between 6 and 10 characters;
    • 2. Your password must contain 1 numeric;
    • 3. Your password must contain at least 1 uppercase and 1 lowercase character;
    • 4. Your password must not be the same as your last 5 passwords
  • Other best practices that Users should follow include:
    • 1. Using a different password for each account;
    • 2. Changing passwords regularly (at least every six months or as required by policy); and
    • 3. Not writing down your password(s) on a piece of paper or recording them in a file on any computer.


Users agree not to take any actions that constitute inappropriate behavior including, but not limited to the following:

  • Intentionally infecting network servers or other computers with a virus.
  • Use of Proxies and tunnels or any other application which is bypassing firewall
  • Use of others username and password for using internet or network resources
  • Creation, access or transmittal of sexually explicit, pornographic, discriminatory, offensive, threatening, harassing or intimidating materials.
  • Connecting networking equipments including, but not limited to servers, routers, hubs and switches, and wireless access points to the campus network without written authorization.
  • Communicating with other users using inappropriate, offensive or abusive language, within the campus network or through external networks
  • Causing intentional damage to computer systems
  • Obtaining additional resources not authorized to the individual user
  • Depriving other users of authorized resources
  • Acquiring access to unauthorized systems
  • Utilizing another user’s account and password
  • Broadcasting unsolicited email and e-mail that is in violation of the Information Technology Act, 2000.
  • Use of computing facilities for private purposes unrelated to the mission of the college.
  • Exporting software, technical information, encryption software or technology in violation of International or regional export control laws.


The College authority takes the issue of intellectual property and similar rights seriously. Virtually all members of the faculty and student body have copyrights merely by authoring a paper whether for publication or even through a course assignment. Accordingly, as each User should have an expectation that others will not abuse his or her intellectual property rights. Every User must also respect the intellectual property rights of other Users, all members of the college and all third parties. Accordingly, the college requires every User to adhere to a strict policy of respecting intellectual property rights

The potentially infringing uses may involve:

  • Infringement of recorded music, in various forms including but not limited to MP3 files
  • Unauthorized copying of written works, including but not limited to textbooks and course materials;
  • Unauthorized copying and use of digital videos or images, as well as logos and other marks;
  • Unauthorized copying or installation of games or other software, including shareware and
  • Unauthorized copying or use of copyrighted or otherwise proprietary, data or collections of data.

It is the responsibility of every User to avoid infringing any intellectual property right and to report the infringement of another User if and when it is discovered. Failure to respect such rights, or report infringements, is a violation of this IT Policy and is subject to disciplinary actions.


All Users retain the right of privacy in their personal files and data, electronic mail, and voicemail as long as they are using the IT Resources in a manner consistent with the purposes, objectives and mission of the College and this IT Policy. Likewise, Users are obligated to respect the right of privacy that other Users have in their own systems, data and accounts. In the event the College has reasonable suspicion that a User has violated any civil or criminal law, the College Code of Conduct, the IT Policy, or any other policy, procedure or regulation, the College authority reserves the right to access, inspect, monitor, remove, take possession of or surrender to civil or criminal authorities the offending Content, with or without notice or consent of the User.


The college level activities will be updated in the website only if the document provided by the concerned authority is verified and approved by the website editorial committee. The department level documents will be updated when the document provided by the concerned department member will be verified and approved by the editorial committee.


The management and disposal of e-waste is done through IT Cell and Facility Management Committee (FMC). The e-waste in the campus has to be reported to IT Cell. The cell verifies if the reported items can be rectified or cannot be utilized further. If the items cannot be rectified, it will be intimated to FMC. FMC will take steps for safe collection and disposal of e-waste through government local bodies.


Users understand that any violation of this policy may call for corrective action as deemed necessary by the individual’s (student/employee) supervisor, department head or Principal. Violators may be subject to local, state and/or central prosecution.