Prohibited Technology and Sensitive Locations

Effective immediately, TAMU-CC must remove or prohibit the use of covered applications and prohibited technologies.

What technology is prohibited

The list of covered applications and prohibited technologies are updated regularly on the Texas Department of Information Resources (DIR) website. Prohibited applications include the social media service TikTok, WeChat, or any successor applications or services developed or provided by ByteDance Limited, or an entity owned by ByteDance Limited. We will inform you of any substantive changes to this list.

Managing TAMU-CC owned devices and networks

TAMU-CC must prohibit the use or download of covered applications and prohibited technology on all TAMU-CC owned devices, including mobile phones, tablets, desktop and laptop computers, and other internet-capable devices. TAMU-CC business and public Wi-Fi networks will block access to prohibited websites. In rare cases, a department can apply for exceptions.

Managing personal devices

Personal devices cannot be used for TAMU-CC business if they have prohibited technology on the device. TAMU-CC employees, researchers, student interns, and contractors are prohibited from conducting business-related activities on personal devices with prohibited technology, which includes:

  • connecting to a state resource (e.g., Duo authentication, Islander Mobile, Outlook email, MS Teams, Zoom)
  • using a native app to access the data (e.g., Mail, Calendar)
  • accessing websites

Sensitive locations

Devices (e.g., smart phones) with prohibited technology are not allowed to enter or be used in sensitive areas on the TAMU-CC campus or in a teleconference meeting where sensitive information is discussed. Visitors granted access to sensitive locations are subject to the same limitations as employees, researchers, student interns, and contractors on prohibited technology-enabled devices when entering sensitive locations. TAMU-CC will maintain a list of sensitive locations on the TAMU-CC website.

For more information or questions, please contact the Office of Information Security.