It is your responsibility to become familiar with UT Arlington policy, procedures, and standards, especially any that are specific to your job duties. Ignorance of policy does not excuse any behaviors or actions that are outside the scope of these established standards. University policies are published on the UTA Policies and Procedures website at https://policy.uta.edu/. Policies and Standards dealing with Information Security are listed below. Please contact the UT Arlington Information Security Office if you have any questions regarding information security policy or standards. 817.272.5487 security@uta.edu
UTA Policy and Standards
- Application Standards
- Approved Data Storage
- Cloud/3rd Party Use Guidance
↳Cloud Procurement Procedures - Configuration Guidelines
- Data Classification
↳Data Classification Standard
↳Data Classification Examples - Incident handling
- Information Security Risk Management Program Standard
- Minimum Security Standards for Workstations
- Minimum Server Security and Hardening Standards
- Mobile Device Standards and Guidelines
- Network Security Standards
- Password Security
- Remote Access
- Secure Data Transfer
- Secure Media Destruction
- SSN Use
- Software Procurement
- Two Factor Authentication
- Vulnerability Management Standard
Procedures
UTA
- Information Security & Acceptable Use Policy
- Server Management Policy - (Retired, see "Minimum Server Security and Hardening Standards" above)
UT System
Texas
- TAC-202
- Texas Business and Commerce Code 521: Identity Theft Enforcement and Protection Act
- Texas Government Code 559: State Government Privacy Policies