Technologies Prohibited by Regulation FAQ
General Questions
Covered Applications | Prohibited Technologies | |
---|---|---|
Scope | Limited to certain social media applications and services (e.g., TikTok, Lemon8, RedNote). | Encompasses a broad set of software and hardware products and services. |
Application | Prohibition only applies to college-owned computers and mobile devices. | Broad set of technical and administrative requirements. |
Exceptions | Exceptions are extremely limited. Law enforcement and Information Security Measures only. The college has no authority to make exceptions. | Limited exceptions can be authorized by the college President. |
Faculty and staff may request exceptions for Prohibited Technologies. To request an exception, complete the Exception Request Form. The form must include a business justification and be approved by the President. See Standards for Technologies Prohibited by Regulation for more information.
Note: No exceptions may be authorized for social media services classified as Covered Applications under Texas Government Code §620.For this policy, mobile devices include but are not limited to laptops, smart phones, tablets, smart watches, and e-readers.
The DIR maintains a list of Prohibited Technologies and Covered Applications, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity).
More information regarding Prohibited Technologies and Covered Applications can be found on the DIR Covered Applications and Prohibited Technologies webpage.
LSCO does not manage users' personal devices. Users with personal devices with prohibited technologies installed will be prohibited from entering sensitive locations and blocked on the college network if they connect to college-owned networks.
LSCO is a public college and a state agency and is therefore subject to complying with requirements set by the Office of the Governor, rules set by regulatory agencies, and legislative mandates passed into law. Further, the Texas State University System issues policies corresponding to similar compliance requirements.
Students
Sponsored student organizations should report use of prohibited technologies by completing the college’s Information Security Incident Form.
Faculty and Staff
Let us know the use of your prohibited technology by completing the college’s Information Security Incident Form and representatives from Information Technology Services will contact you with recommendations on next steps.
Discontinue the use of the prohibited technology and let us know by completing the college’s Information Security Incident Form. Representatives from Information Technology Services will contact you with recommendations on next steps.
No. Having prohibited technology on your personal device while conducting state business is prohibited. You need to remove the prohibited technology before continuing to use this device for college business. If you are required to conduct college business on this device and cannot or will not remove the prohibited technology, you should consult with your supervisor about what device(s) may be made available for performing your duties.
The DIR maintains a list of prohibited technologies, including software, applications,
developers, hardware, equipment, and manufacturers, as well as technologies from any
subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child
company partially owned by a listed entity). As part of the IT procurement process,
Information Security and Information Technology Services will perform reviews that
include a prohibited technology check.
More information regarding Prohibited Technologies and Covered Applications can be
found on the DIR Covered Applications and Prohibited Technologies webpage.