Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Current »

The University of Texas at Austin has several data and computing security policies to ensure the UT's computer and network environment data security, hardware security, IT procurement, and inventory.  IT is required to secure and computer a computer device.

Computing Purchasing

To ensure computing purchases conform to UT's security policies and procedures, all computing purchases, including, desktops, laptops, tablets, mobile phones, and servers must be submitted to the PRC Computing Services Group for purchasing.  The PRC CSG will contact the vendor to obtain a quote


Computing Equipment Used for Personal Use - All computers, monitors, printers, tablets, mobile phones, and other communication equipment purchased with University of Texas at Austin monies, including the 26 accounts, are the property of the university. (HBP 16.2.A1)  Property of the university is for conducting UT business and must abide but the guidelines stipulated by the university and/or by the statement of work that was identified as a deliverable in the contract or grant. (HBP 2.2)  UT property must not be used for personal use or given to a family member, a relative, or an acquaintance that is not affiliated with the university.  We understand that UT computing equipment may be used occasionally for checking personal email or personal social media sites, etc which may be acceptable use if it does not impede or interfere with UT business.



All UT computing equipment, including desktops, laptops, tablets, and mobile phones, purchased using university funds, including research grants, are considered university property.  UT computing equipment can only use by a UT employee for conducting UT business.  We understand that UT computing equipment may be used for checking personal email or checking social media sites. which is an acceptable use if it does not impede or interfere with UT business.  However, UT computing equipment can not be used, given, or loaned to a family member, relative, or friend.  Doing so violates UT policies and state law.




Sources:

HBP, Part 2, Fund Accounting
https://afm.utexas.edu/hbp/part-2/2-types-of-funds

HBP, Part 16.2 Acquisition of Equipment
https://afm.utexas.edu/hbp/part-16/2-acquisition-of-equipment


  • No labels