It is your responsibility to become familiar with UT Arlington policy, procedures, and standards, especially any that are specific to your job duties. Ignorance of policy does not excuse any behaviors or actions that are outside the scope of these established standards. University policies are published on the UTA Policies and Procedures website at https://policy.uta.edu/. Policies and Standards dealing with Information Security are listed below. Please contact the UT Arlington Information Security Office if you have any questions regarding information security policy or standards. 817.272.5487 security@uta.edu
Security Policies and Standards
Texas
- TAC-202
- Texas Business and Commerce Code 521: Identity Theft Enforcement and Protection Act
- Texas Government Code 559: State Government Privacy Policies
UT System
UTA Security Policies
UTA Security Standards
- Application Standards
- Approved Data Storage
- Data Classification
↳Data Classification Standard
↳Data Classification Examples - Incident handling
- Information Security Risk Management Program Standard
- Minimum Security Standards for Workstations
- Minimum Server Security and Hardening Standards
- Mobile Device Standards and Guidelines
- Network Security Standards
- Password Security
- Prohibited Technologies Security Standard
- Remote Access
- Secure Data Transfer
- Secure Media Destruction
- Security Control Framework and Required Security Controls Standard
- SSN Use
- Two Factor Authentication
- User Computing Device Configuration Standards
- Vulnerability Management Standard
UTA Security Procedures
- Information Security Procedures for Procruement of Software and Cloud-Based Services
- Information Security Risk Assessment Procedure
- Information Security Policy and Standards Exception Procedure