PS-2 Position Risk Designation
Last Review: 10/1/22
Statement
The security controls implemented for individual positions shall be determined based on the risk level associated with the position.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.
Implementation
- All authorized users, including third parties, with access to information resources shall agree to all IT security policies prior to being granted access to a University system.
- IT positions with system(s) access will include information security as part of their responsibilities.