On February 6, 2023, the State of Texas released a model plan as required by Governor Greg Abbott’s December 7, 2022, directive banning Tik Tok on all state agency owned devices and networks. This model plan includes additional Prohibited Technologies and detailed objectives intended to protect the state’s information resources and infrastructure. Additionally, the 88th Texas Legislature adopted Texas Government Code Chapter 620 (TGC §620) on June 14, 2023. This government code addresses the use of certain social media applications known as Covered Applications.
The model plan concerning Prohibited Technologies and TGC §620 requires each state agency to develop its own policies and procedures to support the implementation of these requirements. This page supports the Division of Information Technology and Â鶹ӳ»Ó°Òô in fulfilling this obligation and is a complement to the Standards for Technologies Prohibited by Regulation and the Texas State University systems . [Link to PDF]
As required by the state of Texas, there are five (5) objectives applicable to every state agency and institution of higher education in Texas, including their employees, contractors, interns, and any users of state-owned networks. The following section includes the objectives and a summary of how these objectives impact Â鶹ӳ»Ó°Òô and its constituents. and .Impact on Â鶹ӳ»Ó°Òô users: All university-owned devices must be enrolled in Device Management (DM) software that will enforce restrictions on Prohibited Technologies and Covered Applications and provide greater abilities for the university to maintain control over its equipment and data.
Impact on Â鶹ӳ»Ó°Òô users: Faculty, staff, contractors, interns, and student workers are prohibited from installing, using, or operating prohibited technologies on any personally owned device used to conduct state business (i.e., university business).
For the purposes of this objective, "State Business" is defined as employees or contractors accessing university-owned information resources including, but not limited to, data, information systems, email accounts, non-public facing communications, telecommunication systems, and video conferencing.Impact on Â鶹ӳ»Ó°Òô users: “Sensitive locations” are physical or logical locations intentionally designated as a place routinely used by university employees or contractors to discuss confidential or sensitive information. Â鶹ӳ»Ó°Òô will identify and designate sensitive locations requiring additional protection and implement appropriate measures in accordance with the plan.
Required measures may include physical signage, prohibiting unauthorized devices from entering the locations, and requiring visitors to adhere to the same requirements unless the visitor is the owner or subject of the meeting, as would be the case when a student speaks with their professor, academic advisor, or counselor.
Spaces that are not inherently designated as a “sensitive location” may still be used to facilitate customary and essential communications and practices inherent to higher education. Additional and/or alternative safeguards may be applicable to minimize the effect of incidental information disclosures that may occur in such spaces (e.g., classrooms used for academic courses, lobbies, or waiting rooms).
Impact on Â鶹ӳ»Ó°Òô users: The Texas Department of Information Resources (DIR) and The Department of Public Safety (DPS) will update the list of prohibited technologies as necessary. Â鶹ӳ»Ó°Òô will leverage the list to implement the removal and prohibition of prohibited technologies and prohibit the use, acquisition, and/or reimbursement for purchases of any prohibited technologies.
Â鶹ӳ»Ó°Òô is a public university and a state agency and is therefore subject to complying with requirements set by the Office of the Governor, rules set by regulatory agencies, and legislative mandates passed into law. Further, the Texas State University System issues policies corresponding to similar compliance requirements.
Covered Applications |
Prohibited Technologies |
Limited to certain social media applications and services (e.g., TikTok). |
Encompasses a broad set of software and hardware products and services. |
Prohibition only applies to Â鶹ӳ»Ó°Òô-owned computers and mobile devices. |
Broad set of technical and administrative requirements. |
Exceptions are extremely limited. Law enforcement and Information Security Measures only. Â鶹ӳ»Ó°Òô has no authority to make exceptions. |
Limited exceptions can be authorized by Â鶹ӳ»Ó°Òô President. |
The DIR maintains a list of Prohibited Technologies, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity).
The list is available here:
Covered Applications are identified by proclamation of the Governor. Presently the only technologies identified as Covered Applications are TikTok and other services from TikTok’s parent company ByteDance Ltd.
Faculty and staff may request exceptions for Prohibited Technologies. To request an exception, complete the Prohibited Technologies Exception Request Form. The form must include a business justification and be approved by the President. See the page for more information.
Note: No exceptions may be authorized for social media services classified as Covered Applications under .
For this policy, mobile devices include but are not limited to laptops, smart phones, tablets, smart watches, and e-readers.
Visit our Definition Catalog for a full list of terms and definitions.
Â鶹ӳ»Ó°Òô does not manage user’s personal devices. Users with personal devices with prohibited technologies installed will be prohibited from entering sensitive locations and blocked on the Â鶹ӳ»Ó°Òô network if they connect to Â鶹ӳ»Ó°Òô-owned networks.
These rules apply to all individuals accessing Â鶹ӳ»Ó°Òô-owned information resources.
You may have prohibited technologies on personally owned devices. However, you cannot conduct university business from a personally owned device that contains prohibited technologies.
Yes, an exception has been granted for students who live in Â鶹ӳ»Ó°Òô housing and connect their personal devices to the Cardinal Village network via wireless or ethernet connection.
Sponsored student organizations should report the use of prohibited technologies via the form.
Let us know the use of your prohibited technology by completing the form and representatives from the Information Technology Division will contact you with recommendations on next steps.
This answer depends on the tools and technologies you use on a day-to-day basis. Employees who use only Â鶹ӳ»Ó°Òô-owned devices, software, and other technologies to do their job should experience little to no impact.
Discontinue the use of the prohibited technology and let us know by completing the t form and representatives from the Information Technology Division will contact you with recommendations on next steps.
No. Having prohibited technology on your personal device while conducting state business is prohibited. You need to remove the prohibited technology before continuing to use this device for university business. If you are required to conduct university business on this device and cannot or will not remove the prohibited technology, you should consult with your supervisor about what device(s) may be made available for performing your duties.
No. Sensitive locations will be designated by Â鶹ӳ»Ó°Òô and will be marked as such.
It is recommended that a Â鶹ӳ»Ó°Òô-issued device be used to work remotely. However, if a personal device is being used to conduct university business, prohibited technologies cannot be installed.
No. Objective 4’s requirements for network restrictions are limited to Â鶹ӳ»Ó°Òô-owned networks.
Yes, within the scope of this prohibition, using your personal device as part of Duo Multi-Factor Authentication (MFA) is not considered conducting state business or university business.
Yes, you are allowed to use your personal device to call or text your coworkers to conduct university business if you are not transmitting sensitive or confidential information.
The DIR maintains a list of prohibited technologies, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity).
No. Â鶹ӳ»Ó°Òô’s device management software is for university-owned devices.