Information Security Standards

Acceptable Use

GENERAL

Under the provisions of the Information Resources Management Act, information resources are strategic assets of the State of Texas that must be managed as valuable state resources, thus this procedure is established to:

• ensure compliance with applicable statutes, regulations, and mandates regarding the management of information resources;

• establish prudent and acceptable practices regarding the use of information resources; and,

• educate individuals who may use information resources with respect to their responsibilities associated with such use.

APPLICABILITY

This procedure applies to all University information resources. The purpose of this procedure is to provide a set of measures that will mitigate information security risks associated with acceptable use of University information resources. The intended audience for this procedure includes, but is not limited to, all information resources owners, system administrators, and users of University information resources.

PROCEDURES

The procedures determining acceptable use of University information resources are addressed in the following rules, procedures, and standards:

System Policy 07.01, Ethics Policy

System Policy 21.04, Control of Fraud and Fraudulent Actions

System Policy 33.04, Use of System Property

University Procedure 33.04.02.R0.01, Use of Telecommunications Service

System Regulation 29.01.02, Use of Licensed Commercial Software

University Information Security Standard Administrative Procedure, Authorized Software

University Information Security Standard Administrative Procedure, Incident Management

University Information Security Standard Administrative Procedure, Intranet/Internet Usage

University Information Security Standard Administrative Procedure, Network Access

University Information Security Standard Administrative Procedure, Identification, Authentication, and Passwords

University Information Security Standard Administrative Procedure, Privacy

University Information Security Standard Administrative Procedure, Security Monitoring

HISTORY

Last Updated March 31, 2014.