PRC-Managed Computer Policy
The University of Texas at Austin has several data and computing security policies to ensure the UT's computer and network environment data security, hardware security, IT procurement, and inventory. IT is required to secure and computer a computer device.
Computing Purchasing
To ensure computing purchases conform to UT's security policies and procedures, all computing purchases, including, desktops, laptops, tablets, mobile phones, and servers must be submitted to the PRC Computing Services Group for purchasing. The PRC CSG will contact the vendor to obtain a quote
Computing Equipment Used for Personal Use - All computers, monitors, printers, tablets, mobile phones, and other communication equipment purchased with University of Texas at Austin monies, including the 26 accounts, are the property of the university. (HBP 16.2.A1) Property of the university is for conducting UT business and must abide but the guidelines stipulated by the university and/or by the statement of work that was identified as a deliverable in the contract or grant. (HBP 2.2) UT property must not be used for personal use or given to a family member, a relative, or an acquaintance that is not affiliated with the university. We understand that UT computing equipment may be used occasionally for checking personal email or personal social media sites, etc which may be acceptable use if it does not impede or interfere with UT business.
Sources:
HBP, Part 2, Fund Accounting
https://afm.utexas.edu/hbp/part-2/2-types-of-funds
HBP, Part 16.2 Acquisition of Equipment
https://afm.utexas.edu/hbp/part-16/2-acquisition-of-equipment
Welcome to the University Wiki Service! Please use your IID (yourEID@eid.utexas.edu) when prompted for your email address during login or click here to enter your EID. If you are experiencing any issues loading content on pages, please try these steps to clear your browser cache.