{"id":1163,"date":"2024-07-17T16:17:29","date_gmt":"2024-07-17T16:17:29","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1163"},"modified":"2024-09-06T21:18:20","modified_gmt":"2024-09-06T21:18:20","slug":"cm-11-user-installed-software","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/configuration-management-cm\/cm-11-user-installed-software\/","title":{"rendered":"CM-11: User-Installed Software"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">CM-11: User-Installed Software<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>NIST Baseline: &nbsp;<\/strong>Low&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>DIR Required By: &nbsp;<\/strong>01\/20\/2023&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>TAMUS Required By:<\/strong> &nbsp;02\/01\/2024&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Review Date: &nbsp;<\/strong>06\/26\/2024&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list its-nested-list\">\n<li>All software installed on Tarleton-owned or operated computer systems used by faculty, staff, agents, or students in the conduct of university business must be appropriately licensed.&nbsp;\n<ul class=\"wp-block-list\">\n<li>For software having a licensing agreement, persons installing or authorizing the installation of software should be familiar with the terms of the agreement. Where feasible, the licensing agreement should be maintained in the department that operates the system on which the software is installed or through a license management agreement with a third party.&nbsp;<\/li>\n\n\n\n<li>In cases where this is not feasible, individuals or organizations should maintain sufficient documentation (e.g., End User License Agreements, purchase receipts) to validate that the software is appropriately licensed.&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Software shall not be copied or installed by any faculty, staff, agent, or student unless the licensing agreement specifically grants such a procedure.&nbsp;<\/li>\n\n\n\n<li>For instances in which the unit is the owner and\/or custodian of the system hosting the software, the unit is responsible for monitoring user installation of software and ensuring compliance with this Control.&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">References\/Additional Resources<\/h3>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=22#:~:text=%C2%A0(3)%20User%20Responsibilities.%20The%20user%20of%20information%20resources%20has%20the%20responsibility%20to%3A\" target=\"_blank\" rel=\"noreferrer noopener\">1 TAC \u00a7 202.22(a)(3)<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=72\" target=\"_blank\" rel=\"noreferrer noopener\">1 TAC \u00a7 202.72(a)(3)<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/dir.texas.gov\/sites\/default\/files\/2023-02\/Statewide_Plan_for_Preventing_Use_of_Prohibited_Technology_in_State_Agencies_%28Final_OOG%29.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Model Security Plan for Prohibited Technologies<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CM-11: User-Installed Software NIST Baseline: &nbsp;Low&nbsp; DIR Required By: &nbsp;01\/20\/2023&nbsp; TAMUS Required By: &nbsp;02\/01\/2024&nbsp; Review Date: &nbsp;06\/26\/2024&nbsp; References\/Additional Resources 1 TAC \u00a7 202.22(a)(3)&nbsp;&nbsp; 1 TAC \u00a7 202.72(a)(3)&nbsp;&nbsp; Model Security Plan &#8230;<\/p>\n","protected":false},"author":1,"featured_media":580,"parent":1390,"menu_order":10,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1163","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/brian-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"brian"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 17, 2024","modified":"Updated on September 6, 2024"},"absolute_dates_time":{"created":"Posted on July 17, 2024 4:17 pm","modified":"Updated on September 6, 2024 9:18 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1163"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1163\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}