Passwords. Passwords are NEVER to be shared with anyone and under any circumstances. It is a violation of University policy to share a password. Passwords expire every 90 days. Passwords must meet a "strong" complexity requirement as outlined in the password change procedure.You can reset or recover your password through this link: https://iam.uth.tmc.edu/sspr/public/
Email. You are responsible for monitoring official email from GSBS and UTHealth which will only be sent to your official email account (ending in @uth.tmc.edu.) Automatic forwarding of GSBS/UTHealth email is not permitted.
Account Duration. A change in your official status as a student according to the UTHealth Office of the Registrar will cause your network and email accounts to be deleted based on any of the following:
- You withdraw from all your classes.
- You are administratively withdrawn, dismissed, or placed on leave.
- 90 days have passed since the end of your most recent term of enrollment.
- You graduated and 90 days have passed since the last day of your final term of Enrollment.
Procuring Information Technology. Any purchase of information technology goods and services using GSBS funds must be approved by the GSBS IT Manager. Certain purchases may require additional approval from GSBS Deans and Institutional IT personnel.
Confidential or Sensitive Data. Confidential or sensitive data will not be stored under any circumstances on personal laptops, mobile devices and storage devices. Doing so is a violation of Institutional policy and there are Federal and State penalties. All users are provided with institution approved cloud storage. Users are encouraged to use this space for all critical and valuable data sets.
Personal Laptops. All personal laptops must have a working and updated anti-virus scanning software installed.
Personal laptops must have password protection at the operating system level and have full hard disk encryption active (BitLocker for Windows; Filevault2 for Mac OS X)
Graduate Research Assistants and Faculty requiring the use of a laptop to fulfill their duties should request and secure approval and funding for a laptop from their department, lab or program if possible.
MD Anderson Policies
If you are working at MD Anderson, you must comply with MD Anderson's IT policies. Consult the MD Anderson Intranet at inside.mdanderson.org (accessible within MD Anderson's network.)
The following sites have policies which govern information technology use at the institutional level. Not all policies affect GSBS directly; however, most IT Security and Network Operations policies do apply to all GSBS computers and resources.
- Office of the CIO Policy Library (Intranet)
- Handbook Of Operating Procedures (HOOP) - Information Technology