Skip to content

Information Security Standards



This document describes the requirements for dealing with computer security incidents. Security incidents include, but are not restricted to: malicious code detection; unauthorized use of computer accounts and computer systems; theft of computer equipment or theft of information; accidental or malicious disruption or denial of service attacks.


This procedure applies to all University information resources. The purpose of this procedure is to provide a set of measures that will mitigate information security risks associated with Incident Management. The intended audience is Information Security Administrators, Deans, and Department Heads.


Users should report any security potential information to the Information Technology Help Desk. Appropriate Information Technology personnel will assess the situation and report the incident to the University Police Department and / or to the Texas Department of Information Resources.

Information Technology personnel will create and follow procedures specific to the type of incidents that are reported.


Last Updated March 31, 2014

Quick Links

Need an update?

To request a change to this page or to request access to make changes yourself, email