• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
UT Shield
Enterprise Technology
  • Home
  • News
    • Announcements
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Infrastructure
  • Solutions
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Tools
    • Other Solutions
  • Resources
    • Case Studies
    • Concepts
    • Directory Schema
    • How do I…?
    • Policies
    • Technical Docs
    • Terminology
    • Vendor Guide
  • About
    • Metrics
    • Opportunities
    • Roadmap
    • Values
  • Help

Policies

Maintained by the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team

  • Authentication Acceptable Use Policy
  • IAM Cloud Integration Guidelines
  • TED Acceptable Use Policy

Other Useful Documents

Agreements

  • UT Electronic ID Agreement

Federation

  • InCommon Federation
  • The University of Texas System Identity Management Federation Membership Operating Practices

Guidelines

  • Data Encryption Guidelines
  • Digital Identity Guidelines (NIST SPSP A Service Provider (SP) is the server/system which hosts the resource. In this context, you (or your vendor) are configuring the SP that provides a service to your customers. Your SP will integrate with our IdP. For more information, see our Concepts page. 800-63-3)
  • Secure Web Application Coding Guidelines
  • Security Control Standards Catalog (Texas DIR)

Policies

  • Acceptable Use Policy for Employees
  • Acceptable Use Policy for Students
  • Information Resources Use and Security Policy (UT-IRUSPIRUSP The University’s implementation of UTS 165 Information Resources Use and Security Policy is the UT Information Resources Use and Security Policy (UT-IRSUP).)
  • Student Rights Under the Family Educational Rights and Privacy Act (FERPA) (HOP 9-1610)
  • University Identification Card (HOP 3-1610)
  • Web Accessibility Policy
  • Web Linking Policy
  • Web Privacy Policy

Standards

  • Data Classification Standard
  • Minimum Security Standards
  • University Login Banner

Statutes and Regulations

  • Family Educational Rights and Privacy Act (FERPA)
  • Texas Government Code § 552.139 (Texas Public Information Act)

Reporting

  • Report Violation

More

  • Extended List of Confidential Data
  • Security Exception Reporting

More Information

  • Campus IT Policies
  • Regents’ Rules and Regulations
  • University Policy Office
  • UT System Policy Library

Primary Sidebar

Recent News

  • Release Notes – SailPoint IdentityIQ (IIQ) – Version 2026.1.1
  • Release Notes – Enterprise Group Services – Release 2026.1.1
  • Release Notes – midPoint – Release 2026.1.2
  • Release Notes – IGA Infrastructure – Release 2026.1.1
  • Release Notes – Guest Authentication – Release 2026.1.0

Footer

Home
News
Solutions
Resources
About
Help
Authentication
Directory Services
Group and Role Management
Identity Management
Tools
Other Solutions
Alerts & Outages
Campus IT Policies
Campus Solutions
Enterprise Technology
Information Security Office (ISO)
IT@UT
Enterprise Technology Logo

P.O. Box 7407
Austin, TX 78713-7407
+1 512-475-9400
help@utexas.edu

UT Home | Emergency Information | Site Policies | Web Accessibility | Web Privacy | Adobe Reader

© The University of Texas at Austin 2025