IT Policy Guides
Policy Guides bring together all relevant rules, regulations, and controls for specific topics like endpoint management, network access, and data classification.
University Rules & SAPS
Discover Texas A&M's Approach to Information Security: Classifying and Protecting Data to Balance Accessibility, Compliance, and Risk Management.
Some types of data require extra protection due to legal, regulatory, or ethical considerations. Make informed decisions about where and how to store sensitive information.
Balancing innovation with security in the cloud. Learn how Texas A&M's cloud computing policies ensure university data remains protected while enabling access to modern, scalable technology solutions through approved providers and compliance frameworks.
Access to the Texas A&M University network is contingent upon your compliance with the policies and regulations that govern its use. This guide provides a consolidated overview of the rules all users must follow.
Protecting university data starts with secure devices. Learn how Texas A&M's policies and best practices ensure safe, compliant use of computers, phones, and other end-user devices.
Working from an alternate location requires following specific security protocols. Learn the essential practices, required tools, and resources to work safely and effectively from home.
International university travel offers opportunities but presents cybersecurity challenges like device loss, theft, and unauthorized access. Planning ahead with security best practices protects you, your data, and the university.
Last Modified: August 14, 2025