skip to main content

Identity Services

Appropriate Use Policy


Texas A&M Identity Services provides demographic, role and contact data to Texas A&M service providers to support identity management, provisioning, authentication, and authorization. The following guidelines are designed to ensure judicious and compliant use of that information, protecting the security and privacy of that data where necessary.

  1. Texas A&M Identity Services data use must be authorized by the appropriate data custodians for student, employee or other data using the identity data request form (doc|pdf).

    • This form is used by the serive provider to specify what data elements are needed for what purpose. The data obtained must be used only for the specific purpose identified on the request form and not for any other purpose, and cannot be supplied to other applications.

    • Texas A&M Identity Services data consumers (applications or services that use data from Texas A&M Identity Services) will be contacted biannually to verify continued need for data access.

  2. Texas A&M Identity Services data use must comply with the applicable State of Texas and Federal laws and regulations concerning privacy and security as well as complying with University policy. Texas A&M Identity Services data use is specifically bound by the University FERPA Policy and University Acceptable Use Guidelines.

  3. Texas A&M Identity Services data may be used for purposes of providing identity management, which includes, for example, directory authentication and authorization services, provisioning services, and contact information.

  4. Texas A&M Identity Services data consumers must provide details on what Texas A&M Identity Services data they store locally.

  5. Texas A&M Identity Services data consumers must take all necessary precautions to secure Texas A&M Identity Services data in transmission and in storage. This includes utilizing security best practices as posted at http://security.tamu.edu/.

  6. Consumers of Texas A&M Identity Services data responsible for any security breach traceable to their use or specific authorization will be reported to the Chief Information Security Officer.

  7. Periodic and random audits will be performed on use of Texas A&M Identity Services data.

  8. Consumers of Texas A&M Identity Services data must provide access logs and access to systems containing Texas A&M Identity Services data upon request.