Dear UTA Students, Faculty, and Staff,
|
In December 2023, Gov. Greg Abbott directed all state agencies to develop a prohibited technologies security policy in response to a ban of the video-sharing application TikTok. To comply, UTA developed its Prohibited Technologies Security Policy, which includes new prohibited technologies as of Jan. 31, 2025.
|
The prohibited technologies include:
|
- Alipay
- ByteDance Ltd.
- CamScanner
- DeepSeek
- Kaspersky
- Lemon8
- Moomoo
- QQ Wallet
- RedNote
- SHAREit
- Tencent Holdings Ltd.
- Tiger Brokers
- TikTok
- VMate
- WeBull
- WeChat
- WeChat Pay
-
WPS Office
- Any subsidiary or affiliate of an entity listed above
|
|
| Prohibited Hardware/Equipment/Manufacturers
|
- Dahua Technology Company
- Huawei Technologies Company
- Hangzhou Hikvision Digital Technology Company
- Hytera Communications Corporation
- SZ DJI Technology Company
- ZTE Corporation
-
Any subsidiary or affiliate of an entity listed above
|
How does the new policy affect me?
|
The model security plan provides guidance on University-owned devices; personal devices belonging to faculty, staff, and students; and locations where sensitive information could be accessed.
|
-
Excluding specific approved exceptions, the use or download of these listed applications or technologies is prohibited on all University-owned devices, including cellphones, tablets, desktop and laptop computers, and other internet-capable devices.
-
Employees and contractors may not install or operate prohibited applications or technologies on any personal device that is also used to conduct University business, in accordance with UTA’s Acceptable Use Policy. University business includes accessing any University-owned data, applications, email accounts, nonpublic-facing communications, state email, VoIP, SMS, video conferencing, CAPPS, Texas.gov, and any other state databases or applications. For example, if you check your UTA employee email account on a personal device, you cannot download prohibited technologies to that device.
-
Unauthorized devices such as personal cellphones, tablets, or laptops may not enter sensitive locations, which includes any electronic meeting labeled as a sensitive location. A sensitive location is any location, physical or digital, that is used to discuss confidential or controlled information, as defined by the Information Security Office’s Data Classification Standard.
|
The University is taking these important steps to help address vulnerabilities presented by the use of these technologies on personal and state-issued devices. These measures help protect both information contained in the University’s network and our critical infrastructure from potential international government surveillance risks.
|
What if I need to use a prohibited technology for research, course instruction, or class work?
|
The governor’s directive allows for exceptions to the policy to be directed by the agency head. Exceptions to the policy may be considered when the use of prohibited technologies is required for a specific business need. The University has requested exceptions for teaching and research, which are still pending with the University of Texas System.
|
We are appreciative of the UTA community’s understanding and flexibility as we work through these changes. For questions regarding the University’s new standard on prohibited technologies, please contact the Information Security Office at security@uta.edu.
|
Cheryl Nifong
Chief Information Security Officer
|
Deepika Chalemela
Chief Information Officer
|
|
|
The University of Texas at Arlington
701 S. Nedderman Drive | Arlington, TX 76019 US
|
|
|
|