Skip to main content

iTech

IT Standard Administrative Procedures

IT Standard Administrative Procedures


The Texas A&M University-Kingsville provides resources and services to faculty, staff, students and guests. iTech procedures articulate the university's vision, strategy, and principles as they relate to the use of information and information technology resources. iTech procedures interpret applicable laws and regulations and ensure that the procedures are consistent with legal and contractual requirements. In addition, iTech procedures specify requirements and standards for the consistent use of information resources across the university

Note: The procedures noted below apply to the entire University community and its guests.


If you cannot open the PDF documents, please ensure you are running the latest version Adobe Reader by clicking on the "Adobe Acrobat Reader" download link at the bottom of this page.

29.01.99.K1.000 Standard Administrative Procedure Definitions

29.01.99.K1.005 Administration of Information Resource Security Standards

29.01.99.K1.010 Acceptable Use Standard Administrative Procedure

29.01.99.K1.020 Account Management Procedure

29.01.99.K1.030 Administrative Access Standard Administrative Procedure

29.01.99.K1.040 Backup Procedure

29.01.99.K1.045 Disaster Recovery Planning Standard Administrative Procedure

29.01.99.K1.050 Change Management Procedure

29.01.99.K1.060 E-mail Procedure

29.01.99.K1.063 Alumni Email Procedure

29.01.99.K1.065 Retiree E-mail

29.01.99.K1.070 Incident Management Standard

29.01.99.K1.080 Internet Usage Procedure

29.01.99.K1.090 Intrusion Detection Procedure

29.01.99.K1.100 Network Access Standard

29.01.99.K1.110 Network Configuration Procedure

29.01.99.K1.120 Password Procedure

29.01.99.K1.130 Physical Access Procedure

29.01.99.K1.140 Portable Computing Security SAP

29.01.99.K1.150 Privacy Procedure

29.01.99.K1.160 Security Monitoring Standard Administrative Procedure

29.01.99.K1.165 Firewall Standard

29.01.99.K1.170 Security Training Procedure

29.01.99.K1.175 New Server Procedure

29.01.99.K1.180 Server Hardening Standard

29.01.99.K1.185 Data Classification Standard

29.01.99.K1.190 Software Licensing Procedure

29.01.99.K1.200 Systems Development Procedure

29.01.99.K1.210 Third Party Access Procedure

29.01.99.K1.220 Antivirus Standard

29.01.99.K1.230 Risk Management of Information Resources Procedure

29.01.99.K1.235 Vulnerability Management Standard

29.01.99.K1.240 Computer Classroom/Lab Procedure

29.01.99.K1.260 Institutional Data Management Procedure

29.01.99.K1.270 IT Hardware and Software Standards

29.01.99.K1.280 IT Project Management Procedure

29.01.99.K1.290 Wireless Access Procedure

29.01.99.K1.300 Application Security Procedure

29.01.99.K1.305 Encryption Procedure

29.01.99.K1.400 Student Information System Access Procedure

29.01.99.K1.410 Student Information System Change Management Procedure

29.01.99.K1.420 Student Information System Developer Access Procedure

29.01.99.K1.430 Multi Factor Authentication

29.01.99.K1.440 Screen Locking Procedure