I. STANDARD STATEMENT

All users must have an UTSA network logon to access university network resources.

II. RATIONALE

This standard supports HOP Policy 8-12 Information Resources Use and Security Policy

III. SCOPE

This standard applies to all UTSA faculty, staff, and students.

IV. CONTACTS

The Office of Information Security
informationsecurity@utsa.edu

V. PROCEDURES

  1. All individuals with access to any UTSA information resource must adhere to the rules established for access and use of the network infrastructure.
  2. Faculty and staff will be provided with access to the wired network. Faculty, staff and students will have access to the wireless network.
  3. By connecting to the UTSA network, the user accepts the terms and conditions set forth in applicable Information Resource Security Policies and Standards, including but not limited to those listed below.
  4. Users must implement all required measures and practices for the protection of the network, including timely patching of the computer operating system and other software, use of antivirus software and adoption of strong passwords. It is prohibited to attempt to detect and/or exploit vulnerabilities on the network.

OIS 22 – Standard for Network Access
Effective Date: December 27, 2011
Last Revised: August 5, 2020