The University of Texas at Austin is committed to managing risks and safeguarding the university’s resources from threats posed by malware and other cyber threats. Malware includes software that intercepts information and delivers it to a third party without authorization. In response to Governor Abbott’s December 7th, 2022, directive, Senate Bill 1893 passed during the 88th Legislative Session, and updated guidance from the Department of Information Resources (DIR) and the Department of Public Safety (DPS), the University of Texas System has issued UTS 200: Prohibited Technology and Covered Applications. This policy is intended to ensure compliance with the new regulations as well as enhance awareness of potential security risks and safeguard sensitive state and university data.
Key Policy Implementation at UT Austin
Prohibited Technologies on State-Owned Equipment:
All UT institutions must take measures to prevent the use of prohibited technologies on state-owned or leased equipment, and as of Thursday, February 27, 2025, these technologies are blocked at UT Austin.
Prohibited Technologies on Personal Devices for University Business:
All full- and part-time faculty, staff, contractors, fellows, post-docs, interns, and anyone performing business, including research, for the University may not use TikTok or other prohibited technology on personal devices that are also used for university business. This includes student employees who perform any University business on a personal device. Alternatively, users could refrain from using personal devices for university business. "University business" is all UT-related work, including using the device to access email and other communications platforms used for work, and acessing any UT data or systems whether for business, education, or research.
What Is Prohibited Technology?
While TikTok is the most well-known example, other prohibited technologies including the following apps, artificial intelligence, and social media: WeChat, WeChat Pay, Alipay, ByteDance Ltd., CamScanner, Kaspersky, QQ Wallet, SHAREit, Tencent Holdings Ltd., VMate, WPS Office, RedNote, DeepSeek (app), Webull, Tiger Broker, Moomoo, Lemon8, as well as any subsidiaries or affiliates of these entities.
For a complete list, please refer to the Texas Department of Information Resources’ Covered Applications and Prohibited Technologies.
UT Austin Compliance Reminder
If you use personal devices for university business (e.g., work-related emails, texts, video conferencing via Zoom or Teams, or accessing University data):
• Uninstall any prohibited technology.
• Or, discontinue using those personal devices for university business.
Note: The use of Duo for two-factor authentication is permitted and does not constitute using a personal device for state business under this policy.