I. STANDARD STATEMENT
UTSA has a vigorous program to protect computing resources and to prevent unauthorized or malicious use.
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy
This standard applies to all UTSA faculty, staff, and students.
The Office of Information Security
- All university login screens shall contain the essential warning against improper use of resources:
This system is for the use of those authorized by the University of Texas at San Antonio; others who access the system may be subject to criminal prosecution. Authorized use is governed by institutional policy and by state and federal laws, and each user is responsible for familiarity and compliance with their provisions. Usage may also be subject to monitoring and testing.
- For multi-user, non-public facing UTSA applications:
This computer application is the property of the University of Texas at San Antonio. Improper or unauthorized use of this application may lead to criminal prosecution or other disciplinary action. Use of this application, authorized or unauthorized, constitutes consent to monitoring of the system and the user’s acknowledgement of accountability and responsibility.
Effective Date: January 1, 2014
Last Revised: August 5, 2020