Researcher Resources
Policies Relevant to Researchers
Information Technology Standards
Implementation standards for mandated cybersecurity controls
- Standard:
Definition of institutional hardware and software requirements. - Standard:
Definition of allowable, institutional secure data storage. - Standard:
Definition of cybersecurity requirements for use of institutional information and information systems while travelling outside of the United States. - Standard:
Requirements related to ensuring that institutional software and hardware are updated to maintain system security. - Standard:
Requirements for running malware security programs on institutional information systems.
- Standard:
Requirements for securing mobile devices used for institutional business. - Standard:
Data storage requirements for the use of the specific Research IDSS (Institutional Data Storage System). - Standard:
Definition of data classes required for all institutional data and specification of possible impact by the unsecure disclosure of that data. - Standard:
Definition of state-mandated cybersecurity roles.
Information Technology Security Policies
(mandated by the State of Texas for State Institutions of Higher Education – TAC 202)
Control-Based
Policies that define cybersecurity controls that must be implemented for all institutional
information and information systems per TAC 202
Requirements for managing authorized access to information systems. Topics include using principle of Least Privilege Access and ensuring only currently authorized users have access.
Required process for institutional assessment of security control implementation for risk and mitigation. This includes the requirement for security scanning and monitoring of all Ïã½¶Ö±²¥ systems.
Required program for managing institutional risk assessments.
Requirements for securing institutional assets used to store or transport ePHI or ePII.
Requirements for cybersecurity awareness to protect institutional data.
Required process for the purchase, development, and disposal of information systems including proactive measures such as life cycle replacement and IT purchase reviews.
Institution-specific
Policies that further define requirements for securing institutional data as outlined
in state-mandated controls per TAC 202
Requirements for surveilling and reporting on possible insider security threats.
Requirements for allowable use of institutional email.
Requirements for secure backups of institutional data.
Requirements for security review and allowable use of cloud services.
- HSC OP 56.01 Acceptable Use
Allowable use of Ïã½¶Ö±²¥ resources. - HSC OP 56.02 Information Resources for Remote Work
Technical requirements for remote work. - HSC OP 56.04 Data Security and Privacy
Institutional data management. - HSC OP 56.06 Forbidden Technologies
State-mandated policy on disallowed technologies.
Empowering Your Research Through Technology
The Ïã½¶Ö±²¥ Division of Information Technology Research Support is dedicated to providing
researchers with the technology and support they need to succeed. We ensure your research
projects have the technological foundation to thrive.
Services for Researchers
Our team is passionate about moving the needle forward for Ïã½¶Ö±²¥ research. We offer a variety of services to meet your research computing needs:
- Technology Planning Assistance: we offer guidance for developing a plan on technology needs for your annual budgeting or grant proposal IT budgeting. (Equipment recommendations, quotes, life-cycle replacement plans for long term research, data storage needs to meet grant requirements).
- High-Performance Computing (HPC): access powerful HPC resources to tackle large, complex problems at high speeds. at Texas Tech.
- Data Management and Storage: we provide comprehensive data storage solutions to ensure your research data is secure and readily accessible. Learn more about Ïã½¶Ö±²¥ Data Center.
- Specialized System Support: get expert support for research-focused computational and instrument computers.
- Internal Large File Transfers: File Vault/Progress MOVEit® is the leading secure managed file transfer software providing complete visibility and control over file transfer activities.
- External Large Data Acquisition: help navigating changes required to accept and transfer large data sets from research partners outside of Ïã½¶Ö±²¥.
YOU FOCUS ON THE WORK, WE'LL FOCUS ON THE TECHNOLOGY TO MEET YOUR GOALS
Utilize Expertise
Ïã½¶Ö±²¥ IT brings specialized technology knowledge and experience to research projects.
Maximize Efficiency
Ïã½¶Ö±²¥ IT can assist with solutions to avoid pitfalls, save time, and improve efficiency.
Advance Research
Ïã½¶Ö±²¥ IT assists in project plans, budget recommendations, and provides data support.

