Prohibited Software

IT Standard CM-06 "User-Installed Software"


TAMUCC users are free to install the vast majority of computer applications on their TAMUCC computer.

However, before installing a new application, users should first check 1) if the application is already supported by TAMUCC and 2) if the application is one of a few prohibited applications.

supported application is one which is provided by and supported by the TAMUCC Division of IT.  In most cases, supported applications are pre-installed on TAMUCC machines and no user installation is required (e.g. Microsoft Office, Chrome browser).  Before installing a software application on a TAMUCC computer, a user should make sure it or a similar program is not already installed and supported. Please click here to see the list of supported TAMUCC applications.

prohibited application is an application that users may not install or use on a TAMUCC computer without an approved exception from the Division of IT.  See below for a list of prohibited applications and prohibited uses of certain applications

Scope and Authority

This is a policy document that defines prohibited applications and classes of applications, and prohibited uses of software.  This document applies to all TAMUCC computing devices.

This document is a supplement to the IT Standards for All Users which can be found on the TAMUCC Policies Page.

The owner of this document is the Office of Information Security (OIS) in the Division of Information Technology.  We can be contacted at

The authority of this document comes from Texas state law, specifically the TAC 202 Security Control Standards Catalog, Section CM-11 which states "The state organization establishes and enforces a policy governing the installation of software by users."

Prohibited Classes of Software Applications

All users are prohibited from installing the following classes of software applications on a TAMUCC computing device.

  1. Software for disabling, circumventing, or testing security measures, e.g., vulnerability scanners, password crackers, and packet sniffers.
  2. Software for which the user does not have a valid license. This includes using a personal license for business uses.
  3. Software for which the vendor is no longer supplying security patches, e.g. Windows XP.
  4. Proprietary encryption software or encryption software that is weaker than AES 128-bit.
  5. Any application for crtyptocurrency mining

Prohibited Individual Software Applications

In addition to the classes of software applications listed above, users also are prohibited from installing the following specific software applications on a TAMUCC computing device.

  1. TOR
  2. BitTorrent
  3. TeamViewer
  4. Any application in the suite of applications, including QQmail

Prohibited Uses of Software Applications

All users are prohibited from using any software application for the following uses.

  1. Unattended remote control of a TAMUCC computing device with an application other than:
    1. SSH;
    2. TAMUCC-managed Microsoft Remote Desktop and RDGateway, or;
    3. TAMUCC-managed Webex.
  2. Cryptocurrency mining
  3. Storing unencrypted TAMUCC information which is controlled or confidential (i.e., any information other than public) on unapproved cloud services.
    1. Approved cloud-based file-sharing services are:
      1. The A&M System-wide Syncplicity service;
      2. The TAMUCC-provided Microsoft OneDrive service;
      3., and;
    2. All other cloud-based file-sharing services are unapproved and shall not be used for storing/sharing unencrypted controlled or confidential information.  
    3. Unapproved services include Google Drive, Dropbox, and Box.  
    4. Further, Syncplicity and OneDrive services associated with an ID other than your IslandID are unapproved.  For example, if you set up a Microsoft OneDrive using your personal Microsoft account, that is unapproved and cannot be used for the storage or sharing of TAMUCC controlled or confidential data.

Consequences for Violation

If a prohibited application is found on a TAMUCC computing device, OIS:

  1. May order the disconnection of the computing device from the TAMUCC network;
  2. May issue a warning to the user, and;
  3. Shall order TSS to either a) remove the application or b) reformat the device.


Users may seek exceptions to the prohibitions below by sending an email to The email should contain a compelling argument for an exception.