Skip to main content
Division of
Information Technology
  • Services
    • Services A-Z
  • Leadership
    • Office of the CIO
      • Chief Information Officer
      • AVP Enterprise Networks
      • Chief Information Security Officer
      • Chief of Staff
      • TAMU Health IT Director
      • Director of Product Strategy & Communication
      • AVP Enterprise Platforms, Cloud, and Shared Services
      • Director of IT Finance
    • IT Governance
      • Purpose
        • IT Governance Definitions
      • Committees
        • Special Groups
        • EITC
        • SITC
        • AIC
          • AIC Decisions
        • IRPSC
          • IRPSC Decisions
          • Task Force 29.01.03
          • IT Policy Review Subcommittee
          • Audiovisual Surveillance Technology Subcommittee
        • EAC
          • EAC Decisions
        • RITC
          • RITC Decisions
        • TTLTC
          • TTLTC Decisions
        • SL
      • Calendar
    • Strategic Initiatives
      • Priority Projects
        • 1. Microsoft (Office) 365 Implementation
        • 2. Aggie Innovation Platform
        • 5. Next Generation Aggie Network
      • Completed Projects
        • New West Campus Data Center
        • Legacy Network Decommission
        • 802.11ac Campus Upgrade
        • 3. Secure Technologies for Aggie Researchers (STAR)
        • NetID Two-Factor Authentication (Duo)
        • University-Wide IT Governance Framework Implementation
        • Campus Firewall Replacement
        • Data Center Resource Migration Plan
        • Self Service Site Strategic Redesign
        • Key Performance Indicators (KPIs)
        • Service Desk Renovation
        • Health Science Center Exchange Email Migration
        • SPECTRIM/Archer Implementation
        • University-Wide Information Technology Governance Framework Development
    • About the Division of IT
      • Contact Us
      • Staff Spotlight
      • Careers
    • Reports & Publications
    • News
  • Security
    • Safe Computing
      • Protect Your Device
        • Protecting Desktops & Laptops
        • Protecting Mobile Devices
        • Stay Secure on Public Wi-Fi
      • Protect Your Identity
        • Protect Myself Top 5
        • Identity Theft
        • Spam
        • Safe Social Networking
        • File Sharing
        • Phishing Emails (& Internet Scams)
      • Protect University Data
        • Protect My Work Top 5
        • Protecting Confidential Information
        • Discovery and Open Records
        • Protecting the Workplace
        • International Travel
    • Cybersecurity Games
    • CAP
      • CAP Application
    • For IT Professionals
      • Best Practices
      • Compromised System Response
      • Incident Response Plan
  • Policy
    • IT Accessibility
    • Frequently Asked Questions
    • Policy Glossary
    • IT Policy
      • Controls Catalog
        • Controls Review Process
        • Controls Posted for Review (current)
      • Exception Requests
      • Laws and Regulations
        • HIPAA
        • CUI
        • DMCA
      • Local Policy
        • Project Management
        • AV Surveillance
          • AVST Operational Standards
        • TAMU Network Use
          • Acceptable Use
          • Anonymous Proxy Servers
          • Guest Wireless Terms of Use
          • Traffic Engineering
          • NAT Devices
        • Cloud Computing at Texas A&M
    • IT Risk Management
      • Risk Assessment Procedures
        • IT Managed Assessment Checklist
        • Non-IT Pro Assessment Checklist
        • Dean/VP Approval Process
        • Reporting & Review
      • Risk Assessment Roles
        • CIO
        • CISO
        • Division Risk Assessment Coordinator
        • Non-IT Professional
      • Risk Remediation
    • IT Continuity of Operations
      • IT Disaster Recovery
        • Unit Level IT DR Planning
    • E-Discovery
      • Overview
      • IT Preservation Holds
        • Preservation Hold Process
      • Public Information Request
  • Community
    • Collaboration
    • IT Communication
      • Campus IT Contacts
      • IT Communication Channels
      • IT Websites
      • Change Management
    • IT Events
    • Tools
      • IT Standards
      • Data Classification Tool
      • Impact Calculator
  • Help
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
IT Policy
  • Controls Catalog Toggle Dropdown
    Controls Review Process Controls Posted for Review
  • Exception Requests
  • Laws and Regulations Toggle Dropdown
    HIPAA CUI DMCA
  • Local Policy Toggle Dropdown
    AV Surveillance TAMU Network Use Cloud Computing at Texas A&M
  • IT Home
  • Policy
  • IT Policy
  • Controls Catalog
  • Controls Posted for Review

Controls Posted for Review

On This Page
  • Security Controls Posted for Review

Security Controls Posted for Review

The following controls are posted to solicit comments prior to publication, as required for new or revised security controls under Standard Administrative Procedure 29.01.03.M0.01 - Security of Electronic Information Resources.

Comments or questions should be forwarded to itpolicy@tamu.edu.

Services
  • Services A-Z
  • Service Categories
Leadership
  • Office of the CIO
  • IT Governance
  • Strategic Initiatives
  • Division of IT
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • CAP
  • Cybersecurity Security Games
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Twitter
  • Follow us on Instagram
Services
  • Services A-Z
  • Service Categories
Leadership
  • Office of the CIO
  • IT Governance
  • Strategic Initiatives
  • Division of IT
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • CAP
  • Cybersecurity Security Games
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Twitter
  • Follow us on Instagram
Texas A&M University
  • Division of Information Technology
  • Site Map
  • Site Policies
  • Accessibility
Back to Top