University of Texas at El Paso
Information Technology
Introduction Minimize    

The usage of Information Resources is evolving and expanding at an unparalleled rate. As this usage grows, so does the possibility of loss or misuse of information. The university recognizes that Information Resources are important state assets that must be safeguarded at all times. All of us, both employees and students, have a responsibility to insure that we protect information entrusted to us. These rules and regulations governing Information Resources for the University of Texas at El Paso are intended to supplement existing policies published by the Texas Department of Information Resources (DIR), and the University of Texas System, as well as reinforce the Texas Computer Crimes Law and other laws governing the use or misuse of state property.

Today, users have computing skills that were previously isolated in central IT groups. Robust software, that at one time was only available on mainframe computers, is now available at the desktop. Hardware is more powerful, faster, and cheaper. In our "connected" world, we continuously increase our dependencies on Internet, intranet, and extranets for conducting business functions. Many of our systems are relying on electronic connections with our vendors and our customers. For all of these reasons, information security today is no longer an obscure function of the automation center. Information risk management is considered to be an integrated part of conducting and continuing state business. The pace of change in information technology requires us to continually evaluate and modify our security programs to meet the increasing challenges in protecting our Information Resources. Information is more than a resource; it has the same value characteristics as other state assets. Information technology has given us many new threat potentials for exploitation of our valuable information.