PRC-Managed Computer Policy

The University of Texas at Austin has several data and computing security policies to ensure the UT's computer and network environment data security, hardware security, IT procurement, and inventory.  IT is required to secure and computer a computer device.

Computing Purchasing

To ensure computing purchases conform to UT's security policies and procedures, all computing purchases, including, desktops, laptops, tablets, mobile phones, and servers must be submitted to the PRC Computing Services Group for purchasing.  The PRC CSG will contact the vendor to obtain a quote


Computing Equipment Used for Personal Use - All computers, monitors, printers, tablets, mobile phones, and other communication equipment purchased with University of Texas at Austin monies, including the 26 accounts, are the property of the university. (HBP 16.2.A1)  Property of the university is for conducting UT business and must abide but the guidelines stipulated by the university and/or by the statement of work that was identified as a deliverable in the contract or grant. (HBP 2.2)  UT property must not be used for personal use or given to a family member, a relative, or an acquaintance that is not affiliated with the university.  We understand that UT computing equipment may be used occasionally for checking personal email or personal social media sites, etc which may be acceptable use if it does not impede or interfere with UT business.







Sources:

HBP, Part 2, Fund Accounting
https://afm.utexas.edu/hbp/part-2/2-types-of-funds

HBP, Part 16.2 Acquisition of Equipment
https://afm.utexas.edu/hbp/part-16/2-acquisition-of-equipment