Table of Contents Information Resources Use and Security Policy Guidance on Acceptable Usage Minimum Security Standards ISO Approved Services and Applications Information Security Policies and Guidelines Penetration Testing Policies and Guidelines Information Resources Use and Security Policy Information Resources Use and Security Policy (IRUSP) Guidance on Acceptable Usage Acceptable Use Policy for Students Digital Millennium Copyright Act Computer Crimes Law Copyright Violations Acceptable Use Policy for Employees Acceptable Use Policy Acknowledgement Form Minimum Security Standards NEW: Compiled Minimum Security Standards Page ISO Approved Services and Applications Approved Encryption Methods Approved Multi-factor Authentication (MFA) Methods Approved Cloud Services Approved Box Apps Information Security Policies and Guidelines Information Resources Use and Security Policy (IRUSP) Data Classification Standard University Login Banner Data Encryption Guidelines Network Monitoring Guidelines Change Management Guidelines Security Exception Reporting Training Requirements for IT Support Staff Change to Campus IT Inventory Control Processes Protecting Sensitive Digital Research Data Application for Exception from Use of University of Texas at Austin Central Processing Services Passwordless Authentication Guidelines Required Training for Contractors with Access to Controlled/Confidential Data Penetration Testing Policies and Guidelines 3rd Party Security Assessments Minimum Requirements