Policies
The purpose of policies is to provide guidelines for network users regarding appropriate behavior and use of networking and computing resources at UT Dallas. The policies adopted by UT Dallas have been designed to provide a secure working environment while allowing users the greatest freedom possible in their academic pursuits.
These policies cover a wide range of topics, from acceptable computer use to proper password procedures to acceptable incidental use of computing resources. Each policy is carefully designed to provide a safe and secure environment for all users while allowing the freedom of use that universities have provided traditionally
If you have questions about any policy or would like to clarify a policy issue, or if you would like to suggest a new policy or a change in an existing policy, please contact the Information Security Office.
- Acceptable_Use_Policy
- Computer Software Copyright
- Digital Millennium Copyright Act
- Encryption Policy
- Identity Finder Facts
- Information Resources Acceptable Use Policy
- Identity Finder
- Information Resources Use and Security Policy
- Mobile Device Security
- Network Connection Policy
- Server Management Policy
- State and Federal Laws
- University E-mail Policy
- University Privacy Policy
Guidelines, Manuals, Procedures, Standards & Forms
- Data Classification Standards
- Extended List of Category I & II Data

- Information Resources Security Operations Manual
- Minimum Security Standards for Systems Associated with Category I, II or III Data
- Security Exception Reporting Process
Vendor Survey
Risk Assessments
- Video Tutorial for Information Security Desktop Survey
- eLearning Information Security Desktop Survey


