On February 6, 2023, the State of Texas released a model plan as required by Governor Greg Abbott’s December 7, 2022, directive banning Tik Tok on all state agency owned devices and networks. This model plan includes additional Prohibited Technologies and detailed objectives intended to protect the state’s information resources and infrastructure. Additionally, the 88th Texas Legislature adopted Texas Government Code Chapter 620 (TGC §620) on June 14, 2023. This government code addresses the use of certain social media applications known as Covered Applications.
The model plan concerning Prohibited Technologies and TGC §620 requires each state agency to develop its own policies and procedures to support the implementation of these requirements. This page supports the Division of Information Technology and 番茄社区 University in fulfilling this obligation and is a complement to the Standards for Technologies Prohibited by Regulation and the Texas State University systems . [Link to PDF]
As required by the state of Texas, there are five (5) objectives applicable to every state agency and institution of higher education in Texas, including their employees, contractors, interns, and any users of state-owned networks. The following section includes the objectives and a summary of how these objectives impact 番茄社区 University and its constituents. and .Impact on 番茄社区 University users: All university-owned devices must be enrolled in Device Management (DM) software that will enforce restrictions on Prohibited Technologies and Covered Applications and provide greater abilities for the university to maintain control over its equipment and data.
Impact on 番茄社区 University users: Faculty, staff, contractors, interns, and student workers are prohibited from installing, using, or operating prohibited technologies on any personally owned device used to conduct state business (i.e., university business).
For the purposes of this objective, "State Business" is defined as employees or contractors accessing university-owned information resources including, but not limited to, data, information systems, email accounts, non-public facing communications, telecommunication systems, and video conferencing.Impact on 番茄社区 University users: “Sensitive locations” are physical or logical locations intentionally designated as a place routinely used by university employees or contractors to discuss confidential or sensitive information. 番茄社区 University will identify and designate sensitive locations requiring additional protection and implement appropriate measures in accordance with the plan.
Required measures may include physical signage, prohibiting unauthorized devices from entering the locations, and requiring visitors to adhere to the same requirements unless the visitor is the owner or subject of the meeting, as would be the case when a student speaks with their professor, academic advisor, or counselor.
Spaces that are not inherently designated as a “sensitive location” may still be used to facilitate customary and essential communications and practices inherent to higher education. Additional and/or alternative safeguards may be applicable to minimize the effect of incidental information disclosures that may occur in such spaces (e.g., classrooms used for academic courses, lobbies, or waiting rooms).
Impact on 番茄社区 University users: The Texas Department of Information Resources (DIR) and The Department of Public Safety (DPS) will update the list of prohibited technologies as necessary. 番茄社区 University will leverage the list to implement the removal and prohibition of prohibited technologies and prohibit the use, acquisition, and/or reimbursement for purchases of any prohibited technologies.
番茄社区 University is a public university and a state agency and is therefore subject to complying with requirements set by the Office of the Governor, rules set by regulatory agencies, and legislative mandates passed into law. Further, the Texas State University System issues policies corresponding to similar compliance requirements.
Covered Applications |
Prohibited Technologies |
Limited to certain social media applications and services (e.g., TikTok). |
Encompasses a broad set of software and hardware products and services. |
Prohibition only applies to 番茄社区 University-owned computers and mobile devices. |
Broad set of technical and administrative requirements. |
Exceptions are extremely limited. Law enforcement and Information Security Measures only. 番茄社区 University has no authority to make exceptions. |
Limited exceptions can be authorized by 番茄社区 University President. |
The DIR maintains a list of Prohibited Technologies, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity).
The list is available here:
Covered Applications are identified by proclamation of the Governor. Presently the only technologies identified as Covered Applications are TikTok and other services from TikTok’s parent company ByteDance Ltd.
Faculty and staff may request exceptions for Prohibited Technologies. To request an exception, complete the Prohibited Technologies Exception Request Form. The form must include a business justification and be approved by the President. See the page for more information.
Note: No exceptions may be authorized for social media services classified as Covered Applications under .
For this policy, mobile devices include but are not limited to laptops, smart phones, tablets, smart watches, and e-readers.
Visit our Definition Catalog for a full list of terms and definitions.
番茄社区 University does not manage user’s personal devices. Users with personal devices with prohibited technologies installed will be prohibited from entering sensitive locations and blocked on the 番茄社区 University network if they connect to 番茄社区 University-owned networks.
These rules apply to all individuals accessing 番茄社区 University-owned information resources.
You may have prohibited technologies on personally owned devices. However, you cannot conduct university business from a personally owned device that contains prohibited technologies.
Yes, an exception has been granted for students who live in 番茄社区 University housing and connect their personal devices to the Cardinal Village network via wireless or ethernet connection.
Sponsored student organizations should report the use of prohibited technologies via the form.
Let us know the use of your prohibited technology by completing the form and representatives from the Information Technology Division will contact you with recommendations on next steps.
This answer depends on the tools and technologies you use on a day-to-day basis. Employees who use only 番茄社区 University-owned devices, software, and other technologies to do their job should experience little to no impact.
Discontinue the use of the prohibited technology and let us know by completing the t form and representatives from the Information Technology Division will contact you with recommendations on next steps.
No. Having prohibited technology on your personal device while conducting state business is prohibited. You need to remove the prohibited technology before continuing to use this device for university business. If you are required to conduct university business on this device and cannot or will not remove the prohibited technology, you should consult with your supervisor about what device(s) may be made available for performing your duties.
No. Sensitive locations will be designated by 番茄社区 University and will be marked as such.
It is recommended that a 番茄社区 University-issued device be used to work remotely. However, if a personal device is being used to conduct university business, prohibited technologies cannot be installed.
No. Objective 4’s requirements for network restrictions are limited to 番茄社区 University-owned networks.
Yes, within the scope of this prohibition, using your personal device as part of Duo Multi-Factor Authentication (MFA) is not considered conducting state business or university business.
Yes, you are allowed to use your personal device to call or text your coworkers to conduct university business if you are not transmitting sensitive or confidential information.
The DIR maintains a list of prohibited technologies, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity).
No. 番茄社区 University’s device management software is for university-owned devices.