Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Introduction

The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College of Education. These security policies were developed based on the understanding of the educational and administrative needs of the College and an evaluation of the existing technical configuration and requirements. These policies are meant to complement existing University of Texas at Austin, University of Texas System, and Texas government policies relating to computer data network security.

...

  • At the request of the primary user or administrator of the computer.
  • To apply operating system or software application updates or patches to the computer.
  • To investigate any suspicious activity by a computer which could lead to network degradation, violate College or University policies, or violate local, state, or federal laws. Use of administrative access by the Information Technology Office to perform an investigation on a computer may only occur with prior approval by one of the following individuals:
    • The primary user or administrator of the computer
    • An associate dean of the College of Education.

 


The Information Technology Office will inform the designated primary user or administrator of a computer when administrative level access was used by the Information Technology Office to access the computer. A log of the use of administrative access by the Information Technology Office will be maintained and available for review upon request. The Information Technology Office will maintain a list of all personnel authorized to utilize this administrative level access to College computers. The personnel granted this level of access will be full-time senior level Information Technology Office staff who will all have received training in the proper use of sensitive and confidential information in accordance with College and University policies and all applicable local, state, and federal laws.

...

  • A request for an exception is received by the Manager of the Information Technology Office or designate along with a rationale for justifying the exception.
  • The Manager of the Information Technology Office or designate analyzes the request and the rationale and determines if the exception should be accepted, denied, or if it requires more investigation
  • If more investigation is required, the Manager of the Information Technology Office or designate and College of Education computer technical support staff determine if there is a cost effective solution to the problem that does not require an exception
  • If there is not an alternate cost effective solution, and the risk is minimal, the exception may be granted
  • Each exception must be re-examined according to its assigned schedule. The schedule can vary from 3 months to 12 months depending on the nature of the exception
  • Any exception request that is rejected may be appealed to the Chairs.

An FAQ is available on the ITO wiki