I. STANDARD STATEMENT

UTSA has a vigorous program to protect computing resources and to prevent unauthorized or malicious use.

II. RATIONALE

This standard supports HOP Policy 8-12 Information Resources Use and Security Policy

III. SCOPE

This standard applies to all UTSA faculty, staff, and students.

IV. CONTACTS

The Office of Information Security
informationsecurity@utsa.edu

V. PROCEDURES

  1. All university login screens shall contain the essential warning against improper use of resources:
    This system is for the use of those authorized by the University of Texas at San Antonio; others who access the system may be subject to criminal prosecution. Authorized use is governed by institutional policy and by state and federal laws, and each user is responsible for familiarity and compliance with their provisions. Usage may also be subject to monitoring and testing.
  2. For multi-user, non-public facing UTSA applications:
    This computer application is the property of the University of Texas at San Antonio. Improper or unauthorized use of this application may lead to criminal prosecution or other disciplinary action. Use of this application, authorized or unauthorized, constitutes consent to monitoring of the system and the user’s acknowledgement of accountability and responsibility.

 

OIS 20 – Standard for Log in Disclaimer Text

Effective Date: January 1, 2014
Last Revised: August 5, 2020