Table of Contents Information Resources Use and Security PolicyGuidance on Acceptable UsageMinimum Security StandardsISO Approved Services and ApplicationsInformation Security Policies and GuidelinesPenetration Testing Policies and Guidelines Information Resources Use and Security Policy Information Resources Use and Security Policy (IRUSP) Guidance on Acceptable Usage Acceptable Use Policy for StudentsDigital Millennium Copyright ActComputer Crimes LawCopyright ViolationsAcceptable Use Policy for EmployeesAcceptable Use Policy Acknowledgement Form Minimum Security Standards NEW: Compiled Minimum Security Standards Page ISO Approved Services and Applications Approved Encryption MethodsApproved Multi-factor Authentication (MFA) MethodsApproved Cloud ServicesApproved Box Apps Information Security Policies and Guidelines Information Resources Use and Security Policy (IRUSP)Data Classification StandardUniversity Login BannerData Encryption GuidelinesNetwork Monitoring GuidelinesChange Management GuidelinesSecurity Exception ReportingTraining Requirements for IT Support StaffChange to Campus IT Inventory Control ProcessesProtecting Sensitive Digital Research DataApplication for Exception from Use of University of Texas at Austin Central Processing ServicesPasswordless Authentication GuidelinesRequired Training for Contractors with Access to Controlled/Confidential Data Penetration Testing Policies and Guidelines 3rd Party Security Assessments Minimum Requirements