Prohibited Technologies and Covered Applications
Prohibited Technologies
On December 7, 2022, Governor Greg Abbott required all state agencies to ban the video-sharing application TikTok from all state-owned and state-issued devices and networks over the Chinese Communist Party's ability to use the application for surveilling Texans. Additionally, Governor Abbott directed the Texas Department of Public Safety (DPS) and the Texas Department of Information Resources (DIR) to develop a plan providing state agencies guidance on managing personal devices used to conduct state business.
The list of prohibited software and hardware products can be found on the Texas Department of Information Resources Covered Applications and Prohibited Technologies website.
Covered Applications
Effective June 14, 2023, Texas Government Code Chapter 620 requires all state agencies to prohibit the installation or use of covered applications on governmental entity devices, which include devices owned or leased by an institution of higher education. Covered applications are social media applications or services specified by proclamation of the governor under Texas Government Code, Section 620.005.
UH System Policy
The UH System implemented SAM 07.A.12, Prohibited Technologies and Covered Applications, to comply with the Governor's order and Texas Government Code Chapter 620. Exception requests as allowed by SAM 07.A.12, Section 5 must be submitted using the Exception Request Form.
The Model Security Plan for Prohibited Technologies and the Model Policy for Preventing Use of Prohibited Technology and Covered Applications can be found on the Texas Department of Information Resources Covered Applications and Prohibited Technologies website.
FAQs
The UH System and each of its universities are state agencies and as such must comply with requirements set by the Office of the Governor and legislative mandates passed into law.
No. Employees are prohibited from conducting university business on any device containing prohibited technology, even a personal device. To use the device for university business you must remove the prohibited technology.
Some examples of using a device to conduct university business are accessing any university-owned data, applications, or email accounts, creating a post on university social media accounts, or using SMS or video conferencing to discuss university business.
For questions related to prohibited technologies and covered applications, please contact UHS Information Security at:
University of Houston | security@uh.edu |
University of Houston-Clear Lake | security@uhcl.edu |
University of Houston-Downtown | security@uhd.edu |
University of Houston-Victoria | security@uhv.edu |