. The University of Texas home page
UTPD logo
Title Administration / Policy B-27
Effective Date 11-06-07
Rescinds 04-11-07
Subject Use of Outside Hardware, Software, and/or Portable Computing Device
Purpose To establish a policy regarding the introduction of outside hardware, software, and/or portable computing devices to University owned computers or networks.
Scope This directive applies to all personnel.
Reference  
CALEA  
  1. Definitions:
    1. Hardware: Any physical piece of equipment or a device that is installed as a permanent part of a computer.
    2. Portable Computing Device: Any easily portable device that is capable of receiving, transmitting, and/or storing electronic data. This includes, but is not limited to:
      1. Laptop, notebook, handheld, and tablet computers
      2. Personal Data Assistant (PDA)
      3. Universal Serial Bus (USB) drives
      4. Digital Cameras
      5. External hard drives
      6. Memory cards
      7. Pagers
      8. Cell Phones
      9. Data disks
      10. CD’s
      11. DVD’s
      12. Magnetic tapes
    3. Software: Programs that enable a computer to perform specific tasks and can be introduced by downloading from the internet, or installing from a data disk. These include:
      1. Applications
      2. Operating Systems
      Commercially produced Compact Discs (CD) or Digital Video Discs (DVD) that are read only and don't have the ability to introduce malicious code or a virus are not considered software for this policy.
    4. Confidential University Data: Data maintained by an Entity of The University of Texas System. This includes, but not limited to:
      1. data of which unauthorized disclosure or use could cause serious damage to an organization or individual or
      2. data that is exempt from disclosure under provisions of the Public Records Act or other applicable state and federal laws. For example, social security numbers, an individual’s date of birth, the name of an individual who chose to use a pseudonym or
      3. data related to or containing any portion of a UTPD police report, affidavit, complaint, or any information that could be included in a police report.
  2. Responsibilities:
    1. This department is responsible for controlling the introduction of outside hardware and software to University owned computers, networks, and mobile data terminals.
    2. No individual will introduce any outside software, hardware, or portable computing device to a University owned computer or network without prior approval from their supervisor and Technology Resources.
    3. Employees are encouraged to use the space available on http://webspace.utexas.edu rather than portable computing devices, to transfer or store information.
    4. As a general practice, Confidential University Data is not to be copied to or stored on a Portable Computing Device. Under certain circumstances, the Chief of Police or his designee may grant an exception to the policy. Exceptions that are deemed a necessary business may be considered.
    5. Personally owned equipment with a wireless connection will only connect to The University’s wireless network for internet connection. At no time shall any piece of outside hardware be connected to UT Police Department computers, networks, or servers using a network cable without prior authorization from a supervisor and Technology Resources.