As users of information services provided by the Information Technology Services department, you must be aware of the following security, privacy and copyright policies and procedures which must be followed to ensure the security and integrity of THECB information and data.

Security

The Information Technology Services department is responsible for the security of agency networks and systems and tasked with maintaining the integrity of information and data contained in THECB systems. The assignment and maintenance of passwords that provides access to our externally available web applications is a State-mandated security measure.

You will select a unique password (to use with your email address as your username) giving you access to specific applications and data in THECB systems necessary for you to perform your job-related duties. You should commit these logon IDs and passwords to memory. Do not write them down. Do not reveal them to any other person for any reason. You are responsible for maintaining the security of your access accounts. Failure to observe security restrictions may constitute a "Breach of Computer Security" as defined in the Texas Penal Code, Chapter 33, Sec. 33.02, B, and such an offense constitutes a criminal offense.

Privacy

Unauthorized disclosure of confidential student information is illegal as provided in the Family Educational Rights and Privacy Act of 1974 (FERPA) and in the implementing federal regulations found in 34 CFR Part 99. FERPA is specifically incorporated into the Texas Public Information Act as an exception to records which are subject to disclosures to the public (Texas Government Code, Chapter 552).

Any data sets or output reports that THECB staff may generate with individual student data are confidential. You will not disclose to any unauthorized person any data sets or reports with individual student data which you are given or develop. Also, you are responsible for any computer transactions performed as a result of access authorized by use of password(s). The capability to access personal information will not be used for any other purpose than for the intended purpose.

Violations

Violation of policies or procedures set forth in this Agreement may result in disciplinary action up to and including termination, as well as possible prosecution under Federal and Texas law.