Information Security Standards
Acceptable Use
GENERAL
Under the provisions of the Information Resources Management Act, information resources are strategic assets of the State of Texas that must be managed as valuable state resources, thus this procedure is established to:
• ensure compliance with applicable statutes, regulations, and mandates regarding the management of information resources;
• establish prudent and acceptable practices regarding the use of information resources; and,
• educate individuals who may use information resources with respect to their responsibilities associated with such use.
APPLICABILITY
This procedure applies to all University information resources. The purpose of this procedure is to provide a set of measures that will mitigate information security risks associated with acceptable use of University information resources. The intended audience for this procedure includes, but is not limited to, all information resources owners, system administrators, and users of University information resources.
PROCEDURES
The procedures determining acceptable use of University information resources are addressed in the following rules, procedures, and standards:
System Policy 07.01, Ethics Policy
System Policy 21.04, Control of Fraud and Fraudulent Actions
System Policy 33.04, Use of System Property
University Procedure 33.04.02.R0.01, Use of Telecommunications Service
System Regulation 29.01.02, Use of Licensed Commercial Software
University Information Security Standard Administrative Procedure, Authorized Software
University Information Security Standard Administrative Procedure, Incident Management
University Information Security Standard Administrative Procedure, Intranet/Internet Usage
University Information Security Standard Administrative Procedure, Network Access
University Information Security Standard Administrative Procedure, Identification, Authentication, and Passwords
University Information Security Standard Administrative Procedure, Privacy
University Information Security Standard Administrative Procedure, Security Monitoring
HISTORY
Last Updated March 31, 2014.