I. STANDARD STATEMENT
The University authorizes the use of personal computing equipment to individual users and they are in turn charged with complying with published policies and standards and with taking responsibility for their appropriate use of the equipment.
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy
This standard applies to all UTSA faculty, staff, and students.
The Office of Information Security
- The following practices are required for each user of UTSA’s computing resources:
- Becoming familiar with the Acceptable Use Policy.
- Utilizing strong passphrases.
- Installing only legally licensed software.
- Keeping virus protection current.
- Not removing or rendering inactive software loaded onto the computer by University Technology Solutions (UTS).
- Identifying and protecting confidential data on the computer so that special protection can be applied to protect the data.
- Not using e-mail to transmit confidential data – e-mail is not always safe.
- Not allowing unauthorized persons to use university-owned computers or accounts.
- Taking care in not clicking on unfamiliar links to e-mails. Phishing, “social engineering” viruses and other scams are prevalent.
- Taking special care with laptops and portable devices – the user is responsible for protecting them from theft.
- Encrypting UTSA-owned laptops with a product that provides for whole disk encryption.
- Following the University’s destruction procedures for storage media that are no longer in use.
- Backed up data in a manner that provides for full restoration in the event of a disaster or outage. Backup media should be kept separate from the computer and the user must be able to restore data from the backups.
- Reporting concerns about information security threats to a computer to the Office of Information Security at email@example.com or to firstname.lastname@example.org.
OIS 27 – Standard for Personal Computing Security
Effective Date: January 5, 2011
Last Revised: August 4, 2020