GSBS logo
 
Degrees of Discovery logo
 
 
[Resources] [Policies] [Distance Learning] [Classroom A/V] [Website]

Information Technology Policies

Passwords. Passwords are NEVER to be shared with anyone and under any circumstances. It is a violation of University policy to share a password. Passwords expire every 90 days. Passwords must meet a "strong" complexity requirement as outlined in the password change procedure.
    You may change your password at anytime using this link: https://apps.uth.tmc.edu/useradmin/faces/index.jsp
    Email. You are responsible for monitoring official email from GSBS and UTHealth which will only be sent to your official email account (ending in @uth.tmc.edu.) Automatic forwarding of GSBS/UTHealth email is not permitted.
    Account Duration. A change in your official status as a student according to the UTHealth Office of the Registrar will cause your network and email accounts to be deleted based on any of the following:
    1. You withdraw from all your classes.
    2. You are administratively withdrawn, dismissed, or placed on leave.
    3. 90 days have passed since the end of your most recent term of enrollment.
    4. You graduated and 90 days have passed since the last day of your final term of Enrollment.
    Procuring Information Technology. Any purchase of information technology goods and services using UTHealth funds must be approved by the GSBS IT Manager. Certain purchases may require additional approval from GSBS Deans and UTHealth IT personnel.
    Confidential or Sensitive Data. Confidential or sensitive data will not be stored under any circumstances on personal laptops, mobile devices and storage devices. Doing so is a violation of University policy and there are Federal and State penalties. All users are provided with disk storage space in University server machines. Users are encouraged to use this space for all critical and valuable data sets.
    Portable Storage Devices. University of Texas Health Science Center at Houston (UTHealth) data  that is stored or transported on portable media must be encrypted. Portable storage media are to include any device that allows for the removal and transport of computer files, also known as external hard drives and flash drives.
    All purchased portable storage devices must include built-in encryption technology compatible with university encryption standards established in policy by the UTHealth Information Security department. Please note that some portable devices have encryption as an "option", but can still operate without encryption. These devices do NOT meet the standard for this policy. For a current list of devices that have built-in required encryption technology which meets the UTHealth encryption policy, please contact the GSBS IT Manager.
    Personal Laptops. All personal laptops must have a working and updated anti-virus scanning software installed. 
    Personal laptops must have password protection at the operating system level and have full hard disk encryption active (BitLocker for Windows; Filevault2 for Mac OS X)
    Graduate Research Assistants and Faculty requiring the use of a laptop to fulfill their duties should request and secure approval and funding for a laptop from their department, lab or program if possible.
    MD Anderson Policies
    If you are working at MD Anderson, you must comply with MD Anderson's IT policies. Consult the MD Anderson Intranet at inside.mdanderson.org (accessible within MD Anderson's network.)
    UTHealth Policies
    The following sites have policies which govern information technology use at the institutional level.  Not all policies affect GSBS directly; however, most IT Security and Network Operations policies do apply to all GSBS computers and resources.
    UT System Policies
    State/Federal Governing Policies