Maintained by the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team
- Authentication Acceptable Use Policy
- IAM Cloud Integration Guidelines
- uTexas Enterprise Directory (TED) Acceptable Use Policy
Other Useful Documents
Agreements
Federation
- InCommon Federation
- The University of Texas System Identity Management Federation Membership Operating Practices
Guidelines
- Data Encryption Guidelines
- Digital Identity Guidelines (NIST SPSP A Service Provider (SP) is the server/system which hosts the resource. In this context, you (or your vendor) are configuring the SP that provides a service to your customers. Your SP will integrate with our IdP. For more information, see our Concepts page. 800-63-3)
- Secure Web Application Coding Guidelines
- Security Control Standards Catalog (Texas DIR)
- University Identification Card Guidelines
Policies
- Acceptable Use Policy for Employees
- Acceptable Use Policy for Students
- Information Resources Use and Security Policy (UT-IRUSPIRUSP The University’s implementation of UTS 165 Information Resources Use and Security Policy is the UT Information Resources Use and Security Policy (UT-IRSUP).)
- Student Rights Under the Family Educational Rights and Privacy Act (FERPA) (HOP 9-1610)
- University Electronic Mail Student Notification Policy
- University Identification Card (HOP 3-1610)
- Web Accessibility Policy
- Web Linking Policy
- Web Privacy Policy
Standards
Statutes and Regulations
- Family Educational Rights and Privacy Act (FERPA)
- Texas Government Code § 552.139 (Texas Public Information Act)