Skip to main content
Division of
Information Technology
  • Services
    • Services A-Z
  • Leadership
    • Office of the CIO
      • Chief Information Officer
      • AVP Enterprise Networks
      • Chief Information Security Officer
      • Chief of Staff
      • TAMU Health IT Director
      • Director of Product Strategy & Communication
      • AVP Enterprise Platforms, Cloud, and Shared Services
      • Director of IT Finance
    • IT Governance
      • Purpose
        • IT Governance Definitions
      • Committees
        • Special Groups
        • EITC
        • SITC
        • AIC
          • AIC Decisions
        • IRPSC
          • IRPSC Decisions
          • Task Force 29.01.03
          • IT Policy Review Subcommittee
          • Audiovisual Surveillance Technology Subcommittee
        • EAC
          • EAC Decisions
        • RITC
          • RITC Decisions
        • TTLTC
          • TTLTC Decisions
        • SL
      • Calendar
    • Strategic Initiatives
      • Priority Projects
        • 1. Microsoft (Office) 365 Implementation
        • 2. Aggie Innovation Platform
        • 5. Next Generation Aggie Network
      • Completed Projects
        • New West Campus Data Center
        • Legacy Network Decommission
        • 802.11ac Campus Upgrade
        • 3. Secure Technologies for Aggie Researchers (STAR)
        • NetID Two-Factor Authentication (Duo)
        • University-Wide IT Governance Framework Implementation
        • Campus Firewall Replacement
        • Data Center Resource Migration Plan
        • Self Service Site Strategic Redesign
        • Key Performance Indicators (KPIs)
        • Service Desk Renovation
        • Health Science Center Exchange Email Migration
        • SPECTRIM/Archer Implementation
        • University-Wide Information Technology Governance Framework Development
    • About the Division of IT
      • Contact Us
      • Staff Spotlight
      • Careers
    • Reports & Publications
    • News
  • Security
    • Safe Computing
      • Protect Your Device
        • Protecting Desktops & Laptops
        • Protecting Mobile Devices
        • Stay Secure on Public Wi-Fi
      • Protect Your Identity
        • Protect Myself Top 5
        • Identity Theft
        • Spam
        • Safe Social Networking
        • File Sharing
        • Phishing Emails (& Internet Scams)
      • Protect University Data
        • Protect My Work Top 5
        • Protecting Confidential Information
        • Discovery and Open Records
        • Protecting the Workplace
        • International Travel
    • Cybersecurity Games
    • CAP
      • CAP Application
    • For IT Professionals
      • Best Practices
      • Compromised System Response
      • Incident Response Plan
  • Policy
    • IT Accessibility
    • Frequently Asked Questions
    • Policy Glossary
    • IT Policy
      • Controls Catalog
        • Controls Review Process
        • Controls Posted for Review
      • Exception Requests
      • Laws and Regulations
        • HIPAA
        • CUI
        • DMCA
      • Local Policy
        • Project Management
        • AV Surveillance
          • AVST Operational Standards
        • TAMU Network Use
          • Acceptable Use
          • Anonymous Proxy Servers
          • Guest Wireless Terms of Use
          • Traffic Engineering
          • NAT Devices
        • Cloud Computing at Texas A&M
    • IT Risk Management
      • Risk Assessment Procedures
        • IT Managed Assessment Checklist
        • Non-IT Pro Assessment Checklist
        • Dean/VP Approval Process
        • Reporting & Review
      • Risk Assessment Roles
        • CIO
        • CISO
        • Division Risk Assessment Coordinator
        • Non-IT Professional
      • Risk Remediation
    • IT Continuity of Operations
      • IT Disaster Recovery
        • Unit Level IT DR Planning
    • E-Discovery
      • Overview
      • IT Preservation Holds
        • Preservation Hold Process
      • Public Information Request
  • Community
    • Collaboration
    • IT Communication
      • Campus IT Contacts
      • IT Communication Channels
      • IT Websites
      • Change Management
    • IT Events
    • Tools
      • IT Standards
      • Data Classification Tool
      • Impact Calculator
  • Help
  • IT Home
  • Search

Search

 
Services
  • Services A-Z
  • Service Categories
Leadership
  • Office of the CIO
  • IT Governance
  • Strategic Initiatives
  • Division of IT
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • CAP
  • Cybersecurity Security Games
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Twitter
  • Follow us on Instagram
Services
  • Services A-Z
  • Service Categories
Leadership
  • Office of the CIO
  • IT Governance
  • Strategic Initiatives
  • Division of IT
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • CAP
  • Cybersecurity Security Games
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Twitter
  • Follow us on Instagram
Texas A&M University
  • Division of Information Technology
  • Site Map
  • Site Policies
  • Accessibility
Back to Top