Technologies Prohibited by Regulation FAQ

General Questions

Covered Applications Prohibited Technologies
Scope Limited to certain social media applications and services (e.g., TikTok, Lemon8, RedNote). Encompasses a broad set of software and hardware products and services.
Application Prohibition only applies to college-owned computers and mobile devices. Broad set of technical and administrative requirements.
Exceptions Exceptions are extremely limited. Law enforcement and Information Security Measures only. The college has no authority to make exceptions. Limited exceptions can be authorized by the college President.

Faculty and staff may request exceptions for Prohibited Technologies. To request an exception, complete the Exception Request Form. The form must include a business justification and be approved by the President. See Standards for Technologies Prohibited by Regulation for more information.

Note: No exceptions may be authorized for social media services classified as Covered Applications under Texas Government Code §620.

For this policy, mobile devices include but are not limited to laptops, smart phones, tablets, smart watches, and e-readers.

The DIR maintains a list of Prohibited Technologies and Covered Applications, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity).

More information regarding Prohibited Technologies and Covered Applications can be found on the DIR Covered Applications and Prohibited Technologies webpage.

LSCO does not manage users' personal devices. Users with personal devices with prohibited technologies installed will be prohibited from entering sensitive locations and blocked on the college network if they connect to college-owned networks.

LSCO is a public college and a state agency and is therefore subject to complying with requirements set by the Office of the Governor, rules set by regulatory agencies, and legislative mandates passed into law. Further, the Texas State University System issues policies corresponding to similar compliance requirements.

Students

These rules apply to all individuals accessing college-owned information resources.
You may have prohibited technologies on personally-owned devices. However, you cannot conduct college business from a personally-owned device that contains prohibited technologies.

Sponsored student organizations should report use of prohibited technologies by completing the college’s Information Security Incident Form.

Faculty and Staff

Let us know the use of your prohibited technology by completing the college’s Information Security Incident Form and representatives from Information Technology Services will contact you with recommendations on next steps.

This answer depends on the tools and technologies you use on a day-to-day basis. Employees who use only college-owned devices, software, and other technologies to do their job should experience little to no impact.

Discontinue the use of the prohibited technology and let us know by completing the college’s Information Security Incident Form. Representatives from Information Technology Services will contact you with recommendations on next steps.

No. Having prohibited technology on your personal device while conducting state business is prohibited. You need to remove the prohibited technology before continuing to use this device for college business. If you are required to conduct college business on this device and cannot or will not remove the prohibited technology, you should consult with your supervisor about what device(s) may be made available for performing your duties.

No. Sensitive locations will be designated by LSCO and will be marked as such.
It is recommended that a college-issued device be used to work remotely. However, if a personal device is being used to conduct college business, prohibited technologies cannot be installed.
No. Requirements for network restrictions are limited to college-owned networks.
Yes, within the scope of this prohibition, using your personal device as part of Duo Multi-Factor Authentication (MFA) is not considered conducting state business or college business.
Yes, you are allowed to use your personal device to call or text your coworkers to conduct college business if you are not transmitting sensitive or confidential information.
No. LSCO’s device management software is for college-owned devices.

The DIR maintains a list of prohibited technologies, including software, applications, developers, hardware, equipment, and manufacturers, as well as technologies from any subsidiary or affiliate of an entity on DIR’s list (e.g., a software studio or child company partially owned by a listed entity). As part of the IT procurement process, Information Security and Information Technology Services will perform reviews that include a prohibited technology check.

More information regarding Prohibited Technologies and Covered Applications can be found on the DIR Covered Applications and Prohibited Technologies webpage.

View the IT Procurement Procedures

Next Steps