HSC OP 56.06 Prohibited Technologies | Texas Tech University Health Sciences Center

Ïã½¶Ö±²¥

Ïã½¶Ö±²¥ students walking through Lubbock campus courtyard.

[PDF Version]

Last published: 1/31/2024

Ïã½¶Ö±²¥ Logo

Operating Policy and Procedure

HSC OP: 56.06, Prohibited Technologies

PURPOSE: To address the requirements set forth by the Governor of Texas, (12/7/2022) to protect critical state infrastructure and to comply with the Lone Star Infrastructure Protection Act, Ïã½¶Ö±²¥ is adopting this Prohibited Technologies Policy.

All state agencies are prohibited from using of the video-sharing application TikTok on state-owned and state-issued devices or on networks managed by Ïã½¶Ö±²¥. Ïã½¶Ö±²¥ reserves the right to add software and hardware considered to pose security risks to a list of prohibited technologies in accordance with the state of Texas’s continually updated list of identified technologies.

DEFINITION As outlined in the Ïã½¶Ö±²¥ IT Authorized and Unauthorized Hardware/Software Standard, Prohibited Technologies include, but are not limited to:

i. Any technologies that are not properly licensed;

ii. Any technologies that violate federal, state, or local laws or Ïã½¶Ö±²¥ policies;

iii. Any technologies that are considered by the state government of Texas to be a threat to local, state, or national security; or

iv. Any technologies identified on the Department of Information Resources (DIR)’s page.

SCOPE This policy applies to all Ïã½¶Ö±²¥ full and part-time employees including contractors, paid or unpaid interns, and users of state networks. All Ïã½¶Ö±²¥ employees are responsible for complying with the terms and conditions of this policy.

REVIEW: This OP will be reviewed annually by the Ïã½¶Ö±²¥ President.

POLICY:

1. Ïã½¶Ö±²¥-Managed Devices

The use or download of Prohibited Technologies is not permitted on Ïã½¶Ö±²¥-managed devices, including cell phones, tablets, desktop and laptop computers, and other internet-capable devices. Ïã½¶Ö±²¥ must identify, track, and control state-owned devices to prohibit the installation of or access to Prohibited Technologies. This monitoring includes prohibited applications for mobile, desktop, or other internet-capable devices.

Ïã½¶Ö±²¥ must manage all state-issued mobile devices by implementing the security controls listed below:

a. Restrict access to Prohibited Technologies.

b. Maintain the ability to remotely wipe non-compliant or compromised Ïã½¶Ö±²¥-managed mobile devices.

c. Maintain the ability to remotely uninstall unauthorized software from Ïã½¶Ö±²¥-managed mobile devices.

d. Deploy secure baseline configurations for Ïã½¶Ö±²¥-managed mobile devices, as determined by Ïã½¶Ö±²¥.

2. Personal Devices Used for Ïã½¶Ö±²¥ Business

Ïã½¶Ö±²¥ business includes any interaction that requires access to or use of Ïã½¶Ö±²¥-owned or managed networks, data, applications, email accounts, non-public facing communications, email, VoIP, SMS, or video conferencing. Employees and contractors are required to remove all Prohibited Technologies on any personal device that is used to conduct Ïã½¶Ö±²¥ business. Employees and contractors may request that their device be enrolled in the Ïã½¶Ö±²¥â€™s Bring Your Own Device (BYOD) program which ensures endpoint management on all Ïã½¶Ö±²¥ devices.

3. Identification of Sensitive Locations

A sensitive location is any area, physical, or logical (such as video conferencing, or electronic meeting rooms) that is used to discuss confidential or sensitive information, including information technology configurations, criminal justice information, financial data, personally identifiable data, sensitive personal information, or any data protected by federal or state law.

a. Non-Ïã½¶Ö±²¥-managed devices such as personal cell phones, tablets, or laptops that have Prohibited Technologies may not enter locations labeled as sensitive, including any electronic meeting labeled as a sensitive location.

b. Visitors granted access to secure locations are subject to the same limitations as contractors and employees and may not bring unauthorized personal devices that have Prohibited Technologies into secure locations.

4. Network Restrictions

Ïã½¶Ö±²¥ will implement additional network-based restrictions to include:

a. Firewalls configured to block access to Prohibited Technologies on all institutional technology infrastructures, including local networks, WAN, and VPN connections.

b. Not allowing devices with Prohibited Technologies to connect to Ïã½¶Ö±²¥ networks.

5. Ongoing and Emerging Technology Threats

a. Ïã½¶Ö±²¥ will regularly monitor and evaluate additional technologies posing concerns following recommendations from DIR and DPS.

b. All Ïã½¶Ö±²¥ Prohibited Technologies inclusive of state-mandated Prohibited Technologies, can be found in the Ïã½¶Ö±²¥ IT Authorized and Unauthorized Hardware and Software Standard.

c. Ïã½¶Ö±²¥ IT is responsible for blocking or removing any Prohibited Technologies.

6. Purchasing Restriction

Ïã½¶Ö±²¥ will not purchase or reimburse the purchase of any Prohibited Technologies, unless an exception has been approved.

7. Policy Compliance

a. All employees must annually acknowledge and confirm their understanding of this policy.

b. Compliance with this policy will be verified through various methods, including but not limited to, IT/security system reports and feedback to Ïã½¶Ö±²¥ leadership.

c. An employee found to have violated this policy may be subject to disciplinary action, including termination of employment.

8. Violations

Any violation of this policy may result in disciplinary action, up to and including termination of employment. Ïã½¶Ö±²¥ reserves the right to notify the appropriate law enforcement authorities of any unlawful activity and to cooperate in any investigation of such activity.

9. Exceptions

Exceptions to the policy will only be considered when the use of Prohibited Technologies is required for a specific business need, and will be evaluated on a case-by-case basis.

a. To the extent practicable, exception-based use should only be performed on devices that are not used for other Ïã½¶Ö±²¥ business and on non-Ïã½¶Ö±²¥ networks.

b. Exceptions to the ban on Prohibited Technologies may be approved by the President of Ïã½¶Ö±²¥. This authority may not be delegated.

c. All approved exceptions to this policy will be reported to DIR.

10. Relevant Policies

The following Ïã½¶Ö±²¥ policies support the requirements of this HSC OP by implementing controls that ensure state-recognized security baselines for information and information resource management as it applies to the above-mentioned Prohibited Technologies:

• HSC OP 56.01 Acceptable Use

•

•

•

•

•

•

• Ïã½¶Ö±²¥ IT Threat Awareness Program (available by request)

•

Document Approval Details and Revision History can be found on PDF.