Request Procedure forAdministrative Authority

over a CEHD Information Resource

Texas A&M University has implemented a set of Information Security procedures for the protection of computing devices and the data stored within them. The College of Education and Human Development (CEHD) is responsible for devices owned by any unit within the college and is required to submit an annual security risk assessment on these resources. In addition, the CEHD Dean is required to approve security plans as well as the annual risk assessments for all devices. (TAMU SAP 29..01.03.M0.01 2.5, 3.1, 3.2) The operational responsibility for these devicesas well as the creation of risk assessments has been delegated to Technology Services within the CEHD Dean’s Office.

In order to maintain all college devices, administrative control of all CEHD information resources must remain with Technology Services whenever feasible. (Some devices such as tablets do not have the concept of administrative accounts, so are excluded but security plans and risk assessments must still be submitted.) This control allows Technology Services to enforce security policies and system settings, verify that only legally licenses software in installed, as well as implementing other automated tasks.

However, some job responsibilities may require that you can make administrative changes to your system(s) without waiting for Technology Services. In these cases, you may request approval from the CEHD Dean to take over operational responsibility (i.e. administrative authority) for specified devices.

As part of this responsibility, you must

  1. Agree to implement all relevent rules regarding the protection of information resources.

(See

  1. Prepare a Security Plan in accordance with TAMU Control Catalog item PL-2. A template is provided.
  2. Agree to complete an annual risk assessment following requirements from the TAMU Office Information Technology Risk Managementt and submit the risk assessment to the CEHD ISO by March 1 each year. A reminder with specific instructions will be sent by the ISO at the beginning of each year. A template is provided.

Request Procedure

  1. Submit your security plan and the signed request form to Arlen Strader for review.
  2. Once the security plan is confirmed to be complete, the plan and request form will be forwarded to the CEHD Dean for approval.
  3. If approved, you will need to coordinate with Technology Services to setup administrative rights on your computer(s).

Security Plan template and annual security questions are available at

Administrative Authority Request Form

Name:______

Dept:______

E-mail:______

Device(s). Include TAMU Asset # (if inventoried) and Serial Number

Asset #1: ______Serial #1: ______

Asset #2: ______Serial #2: ______

Asset #3: ______Serial #3: ______

Attach the Security Plan for your device(s) with this request.

Reasons for needing Administrative Authority

I agree to 1) implement all relevent rules regarding the protection of information resources. (See 2) prepare a Security Plan in accordance with TAMU Control Catalog item PL-2. A template is provided; 3) submit an annual risk assessment by March 1 of each year.

Requestor:______Date: ______

Approved:______Date: ______

Dean, CEHD