MediaHandler.png

Staying secure at TWU: Covered applications and prohibited technologies

Texas Woman’s University is committed to protecting institutional systems and data in alignment with state cybersecurity requirements. A key part of this effort involves understanding restrictions on certain applications and technologies.

 

These requirements stem from actions taken by Greg Abbott and the State of Texas in response to growing cybersecurity and national security concerns. In December 2022, state agencies and public universities were directed to remove TikTok and similar technologies from state-owned devices due to risks of unauthorized data collection and potential foreign access to user information.

 

This approach was later formalized through Senate Bill 1893, now codified in Texas Government Code Chapter 620, which requires institutions to prohibit certain applications, known as covered applications. The State also maintains a broader list of prohibited technologies, including software, hardware, and emerging tools, such as certain artificial intelligence platforms, that are identified as posing an elevated risk. These lists continue to evolve as new threats are identified.

 

What This Means at TWU

  • Covered applications: Typically, social media or data-intensive platforms that are identified as potential security risks.
  • Prohibited technologies: A broader category of tools not permitted due to higher risk concerns

 

These restrictions apply to university-owned devices and networks and extend to personal devices used for university business.  A list of up-to-date prohibited software and hardware can be found at DIR’s website.

 

Alignment with TWU Policy

These requirements are incorporated into TWU policy through URP 04.710 – Covered Applications and Prohibited Technologies, which requires all users to comply with state-mandated restrictions.

 

Supporting policies, including URP 04.795 – Data Access and Use and URP 04.725 – Information Security and Privacy Awareness, reinforce the responsibility to protect university data and use only approved technologies.

 

TWU systems support sensitive information, including student records, research data, and operational systems. The use of restricted technologies can introduce vulnerabilities, increase the risk of data exposure, and result in non-compliance with state regulations.

 

Support and Guidance

For additional details, see Restricted Technologies on TWU Networks knowledge base article.

 

IT Solutions is available to provide guidance and assist in identifying secure alternatives. When in doubt, it is always best to ask. Reach out to the ITS Service Desk with any questions at 940-898-3971, servicedesk@twu.edu, or submit a ticket.

Maintaining a secure environment is a shared responsibility. Through informed and consistent practices, the TWU community plays a key role in protecting institutional data and systems.