Researcher Resources
Policies Relevant to Researchers
Information Technology Standards
Implementation standards for mandated cybersecurity controls
- Standard: Authorized and Unauthorized Hardware/Software Standard
Definition of institutional hardware and software requirements. - Standard: Data Storage
Definition of allowable, institutional secure data storage. - Standard: Foreign Travel
Definition of cybersecurity requirements for use of institutional information and information systems while travelling outside of the United States. - Standard: Information System Currency
Requirements related to ensuring that institutional software and hardware are updated to maintain system security. - Standard: Malware Detection Standard
Requirements for running malware security programs on institutional information systems.
- Standard: Mobile Devices
Requirements for securing mobile devices used for institutional business. - Standard: Research Data Storage
Data storage requirements for the use of the specific Research IDSS (Institutional Data Storage System). - Standard: Security Categorization of Information and Information System Impact
Definition of data classes required for all institutional data and specification of possible impact by the unsecure disclosure of that data. - Standard: Information and Information System Roles and Responsibilities
Definition of state-mandated cybersecurity roles.
Information Technology Security Policies
(mandated by the State of Texas for State Institutions of Higher Education – TAC 202)
Control-Based
Policies that define cybersecurity controls that must be implemented for all institutional
information and information systems per TAC 202
- IT Policy 56.08 Access Control
Requirements for managing authorized access to information systems. Topics include using principle of Least Privilege Access and ensuring only currently authorized users have access. - IT Policy 56.10 Assessment, Authorization, and Monitoring
Required process for institutional assessment of security control implementation for risk and mitigation. This includes the requirement for security scanning and monitoring of all TTUHSC systems. - IT Policy 56.17 Information Risk Management
Required program for managing institutional risk assessments. - IT Policy 56.35 Media Protection
Requirements for securing institutional assets used to store or transport ePHI or ePII. - IT Policy 56.40 Security Awareness and Training
Requirements for cybersecurity awareness to protect institutional data. - IT Policy 56.39 System and Services Acquisition
Required process for the purchase, development, and disposal of information systems including proactive measures such as life cycle replacement and IT purchase reviews.
Institution-specific
Policies that further define requirements for securing institutional data as outlined
in state-mandated controls per TAC 202
- IT Policy 56.07 Insider Threat
Requirements for surveilling and reporting on possible insider security threats. - IT Policy 56.22 Email
Requirements for allowable use of institutional email. - IT Policy 56.38 Data Backup and Recovery
Requirements for secure backups of institutional data. - IT Policy 56.20 Cloud Computing
Requirements for security review and allowable use of cloud services.
- HSC OP 56.01 Acceptable Use
Allowable use of TTUHSC resources. - HSC OP 56.02 Information Resources for Remote Work
Technical requirements for remote work. - HSC OP 56.04 Data Security and Privacy
Institutional data management. - HSC OP 56.06 Forbidden Technologies
State-mandated policy on disallowed technologies.
Empowering Your Research Through Technology
The TTUHSC Division of Information Technology Research Support is dedicated to providing
researchers with the technology and support they need to succeed. We ensure your research
projects have the technological foundation to thrive.
Services for Researchers
Our team is passionate about moving the needle forward for TTUHSC research. We offer a variety of services to meet your research computing needs:
- Technology Planning Assistance: we offer guidance for developing a plan on technology needs for your annual budgeting or grant proposal IT budgeting. (Equipment recommendations, quotes, life-cycle replacement plans for long term research, data storage needs to meet grant requirements).
- High-Performance Computing (HPC): access powerful HPC resources to tackle large, complex problems at high speeds. High-Performance Computing Center at Texas Tech.
- Data Management and Storage: we provide comprehensive data storage solutions to ensure your research data is secure and readily accessible. Learn more about TTUHSC Data Center.
- Specialized System Support: get expert support for research-focused computational and instrument computers.
- Internal Large File Transfers: File Vault/Progress MOVEit® is the leading secure managed file transfer software providing complete visibility and control over file transfer activities. Access File Vault/Progress MOVEit® transfer.
- External Large Data Acquisition: help navigating changes required to accept and transfer large data sets from research partners outside of TTUHSC. Check out external file transfer information.
YOU FOCUS ON THE WORK, WE'LL FOCUS ON THE TECHNOLOGY TO MEET YOUR GOALS
Click to schedule a consultation or for assistance.
Utilize Expertise
TTUHSC IT brings specialized technology knowledge and experience to research projects.
Maximize Efficiency
TTUHSC IT can assist with solutions to avoid pitfalls, save time, and improve efficiency.
Advance Research
TTUHSC IT assists in project plans, budget recommendations, and provides data support.


