IT Acceptable Use

Contact for Interpretation: Office of Information Security

Parent Rule: 29.01.99.C1, Security of Electronic Information Resources [PDF]

Standard

  1. Acceptable Use
    1. General
      1. As an institution of higher learning, the university encourages, supports, and protects freedom of expression and an open environment to pursue scholarly inquiry and to share information. The university recognizes the importance of information technology to students, faculty and staff in scholarly pursuits, professional development, service activities, personal development and everyday work and class-related activities. In particular, access to networked electronic information (e.g., the Internet) supports the academic community by providing a link to electronic information in a variety of formats and covering all academic disciplines.
      2. As such, the university makes available information resources (e.g., facilities, networks, hardware, software) and information for use by members of the community. Such use must be acceptable, i.e., such use must comply with all relevant law and policy, including federal law (e.g., FERPA), state law (e.g., TAC 202, TAC 213), system policies and regulations, university rules and procedures, relevant IT standards, and the university's Student Code of Conduct.
      3. This section addresses, in general terms, the university's philosophy about computing use and provides an overview of some of the more important law and policy regarding such use. However, it is the responsibility of all users to ensure that their use complies with all relevant law and policy.
      4. Censorship is not compatible with the goals of the university. The university should not limit access to any information due to its content when it meets the standard of legality and is compatible with authorized use. Forms of expression that are not protected by the First Amendment, and therefore may be subject to censorship by the university include obscene material, child pornography, or other violations of the law. Also, the university may block access to content that jeopardizes the security of university information-resources and university information, e.g., websites containing malware.
    2. Acceptable Use Procedures
      1. Only Authorized Use. A user shall not use or attempt to use a university information-resource or university information unless and until the Owner of the information resource or information has authorized such use.
        1. A user shall use a university information-resource or university information only in the manner authorized by the Owner. For example, if an Owner has authorized a user only to view certain information, then the user is not permitted to edit that information even if the user has the technical ability to do so.
      2. Only Legitimate Institutional Use and Permissible Incidental Use. All use must be either 1) legitimate institutional use or 2) permissible incidental use. Legitimate institutional use is use that 1) is reasonably related to the user's official duties with respect to the university (e.g., teaching, research, administration), and 2) furthers the university's mission. Permissible incidental use is defined in System Policy 33.04, Use of System Resources [PDF].
      3. Only Lawful Use. All use must comply with all relevant law and policy, including federal law, state law, system policies and regulations, and university rules, procedures and standards.
      4. Protect Confidential and Controlled Information. Users must protect confidential and controlled information from unauthorized disclosure, modification, or deletion. See, e.g., Family Educational Rights and Privacy Act (FERPA), Texas Public Information Act (TPIA), and the Payment Card Industry Data Security Standard (PCI-DSS).
      5. No indecent or obscene material. Users shall not use university information resources to intentionally access, create, store or transmit material which university may deem to be indecent or obscene (other than in the course of academic research where this aspect of the research has the explicit approval of the university official processes for dealing with academic ethical issues).
      6. Authenticators (e.g., passwords). Users shall neither share their passwords nor accept or use the password of another.
      7. No Private Commercial or Organized Political Use. With the exception of the limited purposes described in System Regulation 33.04.01, Use of System Resources for External Employment [PDF] users shall not be paid, or otherwise profit, from the use of any university information resources or from any output produced from such resources. Users shall not use university information resources to promote non-university-related commercial activity or to conduct organized political activity that is inconsistent with the university's tax-exempt status.
      8. Respect Copyright. Intellectual property laws (e.g., copyright) apply to the electronic environment and users shall respect such laws. Users should assume that information (e.g., documents, messages, software) stored on or communicated by university information resources are subject to copyright unless specifically stated otherwise. Users shall not make unauthorized copies of copyrighted software or other copyrighted materials such as music, films, and textbooks. The university complies with all legal requests for information and will not hesitate to report a user's use in response to a lawful request. Copyright and Fair Use: Using Copyrighted Works.
      9. Hardware and Software. Users shall not 1) use or install unauthorized software or hardware, or 2) make unauthorized changes to university hardware and software.
      10. Only Ethical Use. All use of university information resources and university information must be ethical. (See System Policy 07.01, Ethics [PDF]).
      11. Other Impermissible Use. Users shall not use university information resources or university information to purposely engage in activity that may: harass, threaten or abuse others; degrade the performance of university information resources; deprive an authorized user access to a university resource; obtain extra resources beyond those allocated; circumvent university information security measures. Users shall not otherwise engage in acts against the aims and purposes of the university as specified in its governing documents or in rules, regulations and procedures adopted from time to time.
      12. Physical Security. Users shall secure unattended portable devices. Users working on publicly accessible computers shall logout or invoke a password-protected screensaver when leaving the computer.
      13. Security Incident Reporting. Users shall report to the IT Service Desk any weaknesses in the security of the university's information resources, or any incidents of possible misuse or violation of this or any other policy related to the security of the university's information resources.
  2. IT Privacy
    1. General
      1. Privacy policies are mechanisms used to establish the responsibilities and limits for system administrators and users in providing privacy in university information resources.
      2. Users of university information resources have a basic right of privacy in 1) the files they own which are stored or communicated by university information resources, and 2) the activities they perform using university information resources.
      3. However, there should be no expectation of privacy beyond that which is expressly provided by applicable privacy laws. Privacy is limited by the Texas Public Information Act, administrative review, computer system administration, and audits.
      4. In particular, the university has the right to examine all information stored on or passing through university information resources, and to monitor the activities of any user on university information resources so as to, e.g., ensure business continuity, ensure compliance with law and policy, or conduct authorized investigations.
    2. Privacy Procedures
      1. A file may not be accessed, copied, or modified without prior authorization from the file Owner. This general right to privacy is subject to the following exceptions and limitations:
        1. The file Owner's right to privacy in their files may be limited by other laws and policy. For example, the Texas Public Information Act may require the disclosure of certain data under certain conditions.
        2. A person in the file Owner's chain of command (i.e., the file Owner's supervisor, that supervisor's supervisor, etc.) may access or copy any of the file Owner's files as long as that person has the authorization of the appropriate dean or vice president, i.e., the dean or vice president in the Owner's chain of command.
        3. The IRM, his or her designees, and resource Custodians may log, monitor, copy, and examine any information passing through or stored on any university information resource for which they are responsible for reasons including, but not limited to:
          1. Ensuring compliance with applicable law and policy;
          2. Ensuring business continuity (e.g., making backups);
          3. Monitoring network performance and maintenance activities, or;
          4. Responding to authorized requests for information from, e.g., auditors or investigators.
        4. In 2.2.1.2 and 2.2.1.3, the file Owner's authorization still should be sought before altering a file, except, e.g., where it would interfere with an authorized investigation, or in case of an emergency.
        5. In response to lawful requests, the IRM may provide to authorized entities (e.g., law enforcement, auditors) access to information transmitted through and stored on university information resources after the notification and written approval of the Vice President of Finance & Administration. Exceptions to this procedure may occur in instances related to federal and state laws.
      2. A user's activities on or with a university information resource may not be tracked or recorded without first obtaining authorization from the user. This right of privacy in activities is subject to the following exceptions:
        1. The IRM, or designees, and resource Custodians may, without any notification to a user, monitor some or all of the user's activities on relevant information resources for university- business-related purposes, including but not limited to those enumerated in 2.2.1.3. Examples of such monitoring include logging the phone numbers dialed by a user from their desk phone or recording the web sites a user visited using a university workstation.
        2. The university may perform video and audio surveillance as defined in other policy.
      3. Individuals who have special access to information because of their position have the absolute responsibility not to take advantage of that access.
        1. Such individuals should access only that information that is relevant to the particular task, and only so much of that information as is necessary to achieve the task
        2. If, however, in the course of performing the task such individuals find unrelated evidence of impermissible use or other wrongdoing, those individuals are obligated to report an incident.
        3. If an individual inadvertently accesses information (e.g., seeing a copy of a test or homework) that could provide personal benefit, such individual has the responsibility to notify 1) the file Owner, 2) their own supervisor, and 3) the file Owner's supervisor.
      4. Unless otherwise provided for, individuals whose relationship with the university is terminated (e.g., student graduates; employee takes new job; visitors depart) are considered to cede ownership of, and hence the right to privacy in, all their files to the information resource custodian. The university should determine what information is to be retained and delete all other.
      5. Custodians of web sites available to the general public from university information resources shall abide by and ensure that those web sites contain a link to the university's privacy statement.
  3. Access Control
    1. With rare exceptions (e.g., public web sites), a person must possess a TAMU-CC account to access TAMU-CC information-resources and TAMU-CC information. An account typically comprises a unique username, at least one authenticator (e.g., a password), and a set of permissions (e.g., the ability read or edit certain files). A user is a person to whom TAMU-CC has granted an account. For example, TAMU-CC gives all employees and students an IslandID account which permits the user to log into many TAMU-CC devices and services. When users log into a device, they create a session. That session is destroyed when the user logs out or the device is rebooted.
    2. Accounts and Permissions
      1. By default, users are not authorized to create accounts or to modify the permissions associated with any account. Only the Owner of an information-resource or information, or designees, may create an account for that information-resource or information, or modify the permissions associated with that account.
    3. Authenticators (e.g., Passwords)
      1. Users shall not share their authenticators with anyone without the express, prior permission of the TAMU-CC Information Security Officer ("ISO").
      2. If a user does share their authenticator without such permission, the user must 1) change or replace the authenticator immediately and 2) notify the IT Service Desk.
      3. Users shall not ask for, accept, or use the authenticator of another user.
      4. If a first user accidentally acquires a second user's authenticator, then the first user shall contact the IT Service Desk.
      5. Users shall not store or transmit their passwords in cleartext. Stored/transmitted passwords must be encrypted.
      6. If a user doubts the security of one of thier own authenticators, the user shall change/replace the authenticator immediately. If a user doubts the security of another user's authenticator, then the first user should contact the IT Service Desk.
      7. Users shall return physical authenticators (e.g., Sanddollar Card) on demand of a supervisor or the token's Custodian, or upon termination of the relationship with the University.
    4. Sessions
      1. A user shall not 1) enable or permit the use of the user's session by a person other than the user without the user being present or 2) use a second user's session without the second user being present. For example, a user may not configure remote control software to permit another person to remotely access the user's session without the user being present.
      2. A user shall not leave a session unattended on a TAMU-CC computer without enabling a password-protected screensaver.
      3. An exception to the two previous provisions is when the user's session is being controlled by an authorized IT employee.
  4. University Incidental Use
    1. Permissible incidental use is defined in System Policy 33.04, Use of System Resources [PDF]. The following further restrictions and caveats apply to incidental personal use of the University's information resources and University information:
      1. A user may make incidental use of only those TAMU-CC information resources or information to which they have been authorized per section 3.2.1.
      2. Incidental personal use is restricted to the authorized user; it does not extend to family members or other acquaintances.
      3. Storage of personal electronic data (e.g., personal email messages, voice messages, documents) within University information resources must be nominal.
      4. All personal electronic data stored on, processed by, or transmitted by University information resources may be subject to open records requests and may be accessed in accordance with this document and other policy.
  5. Protection of TAMU-CC Information
    1. Sharing of TAMU-CC Confidential Information.
      1. Users should constantly strive to minimize the amount of TAMU-CC confidential information they share with others.
      2. Users shall not share TAMU-CC confidential information with another entity unless authorized by the information's Owner.
    2. Transmission of TAMU-CC Confidential Information.
      Users:
      1. May transmit encrypted TAMU-CC confidential information over any network, including the Internet, provided the encryption is at least as strong as AES 128-bit.
      2. May transmit unencrypted TAMU-CC confidential information only:
        1. within the TAMU-CC network or with approved devices and services or
        2. over the Internet if the user is certain that the transmission session is encrypted from end-to-end (e.g., SFTP, HTTPS).
      3. All other transmission of TAMU-CC confidential information is prohibited.
    3. Storage of TAMU-CC Confidential Information.
      Users:
      1. Should constantly strive to minimize the amount of TAMU-CC confidential information they store on all devices;
      2. May store encrypted TAMU-CC confidential information on any device or service, provided the encryption is at least as strong as AES 128-bit;
      3. May store unencrypted TAMU-CC confidential information on:any TAMU-CC-owned device or service;
        1. any device or service listed on or
        2. any personally owned device that has whole-disk encryption (e.g., BitLocker, FileVault) enabled; and
      4. Shall not store TAMU-CC confidential information on any device or service that does not satisfy one of the conditions listed above.
    4. Users shall not delete information that is protected by records retention laws (e.g., TPIA, System Regulation 61.99.01 [PDF]) or e-discovery requirements. Such information can include email and text messages. Users should contact the University's Records Retention Officer for more guidance.
  6. Security Incident Reporting
    1. Users shall report security incidents to the IT Service Desk (361-825-2692 or 866-353-2491, ithelp@tamucc.edu)
    2. The University Marketing and Communications office shall handle all interactions with public or private media related to any security incident involving University information resources and sensitive information. All University employees must refer any questions about these issues to this office.
    3. If fraud or theft is suspected as part of security incident detection, the person detecting the incident shall follow System Regulation 10.02.01, Fraud Prevention [PDF].
  7. Hardware and Software
    1. Users shall secure unattended TAMU-CC portable devices (e.g., laptops, tablets, USB memory devices) by e.g., placing the resources in a locked room or tethering the resources with a security cable.
    2. Users shall not install or use the following software on a TAMU-CC information-resource:
      1. No valid license. Software for which the user does not have a valid license (including using personally licensed software for business purposes).
      2. Unsupported/Vulnerable. Commercial software for which the vendor is no longer supplying security patches (e.g., Windows 7, Adobe Acrobat Basic), or open-source software which has one or more known vulnerabilities.
      3. Blacklisted. Software which is widely recognized by the information-security community as malicious.
      4. Peer-to-Peer Filesharing. P2P filesharing software e.g., BitTorrent.
      5. Security Software. Software for disabling, circumventing, or testing security measures, e.g., vulnerability scanners, password crackers, and packet sniffers.
      6. Anti-Virus/Anti-Malware. TAMU-CC installs anti-virus/anti-malware on all its machines. Users shall not install additional anti-virus/anti-malware applications.
      7. Encryption. Proprietary encryption software or encryption software that is weaker than AES 128-bit.
      8. Cryptocurrency Mining. Any software for the mining of cryptocurrencies such as Bitcoin.
    3. Users shall not make the following software changes on a TAMU-CC information-resource unless they are also a Custodian of the information resource, and the change is authorized:
      1. Replace the operating system or boot the device from another operating system;
      2. Disable or modify University anti-malware and other security software;
      3. Turn off whole disk encryption;
      4. Change the domain to which the machine is attached; and
      5. Modify the network-interface configurations, e.g., IP address, protocols.
    4. Users shall not make the following changes to TAMU-CC hardware unless they are also a Custodian of the information resource, and the change is authorized:
      1. Replace or remove internal hardware components, e.g., network card, hard drive, etc.;
      2. Format a University hard drive or other mass storage device;
      3. Attach network extending devices (e.g., access points, routers) to the University network; and
      4. Modify, in any way, University network devices (e.g., routers, firewalls), or network cabling other than station cables.
  8. Prohibited Technology
    1. TAMU-CC must remove or prohibit the use of covered applications and prohibited technologies
      1. A list of prohibited technology can be found on the Texas DIR website.
      2. TAMU-CC prohibits the use or download of covered applications and prohibited technology on all TAMU-CC owned devices, including mobile phones, tablets, desktop and laptop computers, and other internet-capable devices.
      3. TAMU-CC employees, researchers, student interns, and contractors are prohibited from conducting business-related activities on personal devices with prohibited technology.
      4. For more information, visit the full rule on the TAMU-CC prohibited technology website and prohibited technology frequently asked questions website.
    2. Sensitive Areas
      1. Devices (e.g., smart phones) with prohibited technology are not allowed to enter or be used in sensitive areas on the TAMU-CC campus or in a teleconference meeting where sensitive information is discussed. Visitors granted access to sensitive locations are subject to the same limitations as employees, researchers, student interns, and contractors on prohibited technology-enabled devices when entering sensitive locations.
  9. Exceptions
    1. Users seeking an exception to any of the policies in this document should review the exception process page.
  10. Consequences for Violations
    1. All users, including staff, tenured and non-tenured faculty, graduate assistants, student workers, interns, guests, volunteers, and probationary, temporary, or wage employees as well as contractors, consultants, and vendors, are required to adhere to this University procedure, and may be subject to criminal, civil, or disciplinary actions consistent with federal and state laws, System Policy 32.02, Discipline and Dismissal of Employees [PDF], and University policies.
    2. Individuals found in violation of this University Procedure are subject to loss of access privileges to University information resources (e.g., servers, workstations, email, etc.) In addition, contracts associated with contractors, consultants, or vendors are subject to review and possible termination. Any device, system, or software found in violation of this procedure may be confiscated and temporarily stored by the Information Resources Manager or a representative of the office.
    3. Additional guidance may be found, but is not limited to, the following policies and rules.
      1. Texas A&M System Policy
        1. 01.03, Appointing Power and Terms and Conditions of Employment [PDF]
        2. 07.01, Ethics, A&M System Employees [PDF]
        3. 32.02, Discipline and Dismissal of Employees [PDF]
        4. 32.02.02, Discipline and Dismissal Procedure for Nonfaculty Employees [PDF]
        5. 33 Employment, Standards of Conduct
        6. 33.04.01, Use of System Resources for External Employment [PDF]
      2. Texas A&M University-Corpus Christi Rule
        1. 12.01.99.C0.05, Faculty Dismissals, Administrative Leave, Non-Reappointments and Terminal Appointments [PDF]
        2. Student Conduct & Advocacy

Revision History

  • Approved: June 1, 2016 

  • Reviewed: July 22, 2019

  • Reviewed: June 24, 2020

  • Reviewed: June 30, 2021

  • Reviewed: June 15, 2022

  • Reviewed: December 1, 2022 

  • Reviewed: January 2, 2024

  • Reviewed: February 21, 2025

  • Next Scheduled Review: February 1, 2026