Protecting university-owned servers is an expensive and resource intensive endeavor. The ISO will continue to identify systems through a risk assessment process in order to provide an effective means for determining the level of security individual systems will requirement. This in turn will allow the ISO to tailor its program to meet identified risks and potential reallocation of resources to systems deemed to have a greater priority.
• Vulnerability Assessment for Servers
• Systems Administrator Training
• Compliance Training
• Provide Audit Results/Report with Recommendations
Information Security Office
Information Security Policies (PDF)
UT System Information Resources Use and Security Policy - UTS165
Texas Administrative Code 202 (TAC 202)
Payment Card Industry Data Security Standard (PCI DSS)
NOTE: This list is intended to provide a basic reference for complying with Information Security policies. This list represents a portion of all applicable ISPs and is not intended to be all inclusive.
Technology Support Help Desk
Phone: 915.747.4357 (HELP)