University Rules
Departmental Guidelines
These include, but are not limited to:
- The “principle of least privilege” will be observed for all users at all times.
- Users are responsible for maintaining a current list and copies of reciepts and licenses for all software installed on their computer.
One person could be assigned to be in charge of this for a group of computers. - For computers using Microsoft operating systems, the Department has standardized on Microsoft Windows XP Professional.
Windows 2000 is no longer being installed as of August 2004. - Only software that the Department owns or has paid for with Department-related funds that is needed to perform you daily business activities should be installed on Department computers.
- No unauthorized wireless access points are allowed per CIS. Use the TAMUlink wireless access service for wireless access.
- No unauthorized network-attached devices should be connected to the network.
- Make note that automated patching may occur at least once a month to ensure compliance with various security policies.
- You should not attempt to login with any credentials other than your own on any system or service.
- No one other than Department’s IT staff or third parties that have been approved by the Computer Systems Manager should work on workstations, laptops, or any other IT/network-related assets or issues.
- All IT, IS, and computer-related purchases should at the very least be reviewed by IT personnell prior to submitting the PO for the item(s), service(s), or resource(s).
- All workstations should employ a screensaver which automatically locks the screen, requiring password authentication to unlock it. The inactivity timeout should be set to no more than 15 minutes.
- You should lock your workstation when you get up to leave your office.
This page is subject to change at any time, so please check back often…