IT Standard Administrative Procedures

The Texas A&M University-Kingsville provides resources and services to faculty, staff, students and guests. iTech procedures articulate the university's vision, strategy, and principles as they relate to the use of information and information technology resources. iTech procedures interpret applicable laws and regulations and ensure that the procedures are consistent with legal and contractual requirements. In addition, iTech procedures specify requirements and standards for the consistent use of information resources across the university

Note: The procedures noted below apply to the entire University community and its guests.

If you cannot open the PDF documents, please ensure you are running the latest version Adobe Reader by clicking on the "Adobe Reader" icon at the bottom of this page.

29.01.99.K1.000 Standard Administrative Procedure Definitions  Printable PDF

29.01.99.K1.005 Standard Administrative Procedure Administration  Printable PDF

29.01.99.K1.010 Acceptable Use Procedure  Printable PDF

29.01.99.K1.020 Account Management Procedure  Printable PDF

29.01.99.K1.030 Administrative Access Procedure  Printable PDF

29.01.99.K1.040 Backup Procedure  Printable PDF

29.01.99.K1.050 Change Management Procedure  Printable PDF

29.01.99.K1.060 E-mail Procedure  Printable PDF

29.01.99.K1.065 Retiree E-mail  Printable PDF

29.01.99.K1.070 Incident Management Procedure  Printable PDF

29.01.99.K1.080 Internet Usage Procedure  Printable PDF

29.01.99.K1.090 Intrusion Detection Procedure  Printable PDF

29.01.99.K1.100 Network Access Procedure  Printable PDF

29.01.99.K1.110 Network Configuration Procedure  Printable PDF

29.01.99.K1.120 Password Procedure  Printable PDF

29.01.99.K1.130 Physical Access Procedure  Printable PDF

29.01.99.K1.140 Portable Computing Security Procedure  Printable PDF

29.01.99.K1.150 Privacy Procedure  Printable PDF

29.01.99.K1.160 Security Monitoring Procedure  Printable PDF

29.01.99.K1.165 Firewall Procedure  Printable PDF

29.01.99.K1.170 Security Training Procedure  Printable PDF

29.01.99.K1.175 New Server Procedure  Printable PDF

29.01.99.K1.180 Server Hardening Procedure  Printable PDF

29.01.99.K1.185 Data Classification Procedure  Printable PDF

29.01.99.K1.190 Software Licensing Procedure  Printable PDF

29.01.99.K1.200 Systems Development Procedure  Printable PDF

29.01.99.K1.210 Third Party Access Procedure  Printable PDF

29.01.99.K1.220 Virus Procedure  Printable PDF

29.01.99.K1.230 Risk Management of Information Resources Procedure  Printable PDF

29.01.99.K1.235 Vulnerability Management Procedure  Printable PDF

29.01.99.K1.240 Computer Classroom/Lab Procedure  Printable PDF

29.01.99.K1.260 Institutional Data Management Procedure  Printable PDF

29.01.99.K1.270 IT Hardware and Software Standards  Printable PDF

29.01.99.K1.280 IT Project Management Procedure  Printable PDF

29.01.99.K1.290 Wireless Access Procedure  Printable PDF

29.01.99.K1.300 Application Security Procedure  Printable PDF

29.01.99.K1.305 Encryption Procedure  Printable PDF

29.01.99.K1.400 Student Information System Access Procedure  Printable PDF

29.01.99.K1.410 Student Information System Change Management Procedure  Printable PDF

29.01.99.K1.420 Student Information System Developer Access Procedure  Printable PDF

Download Adobe Reader

This page was last updated on: August 17, 2016