- Accessible Information, Materials & Technology
- Administrative Staff
- Assistive Technologies
- Availability
- Campus
- Central IT Department
- Confidentiality
- Covered Individual
- Covered Official
- Cybersecurity Framework
- Data
- Database Accounts
- Data Centers
- Data Confidentiality Categorization
- Data Custodian
- Data Flows
- Data Integrity Categorization
- Data Owner
- Data Steward
- Data User
- Faculty
- Firewalls and Security Systems
- FMLA
- Foreign Country of Concern
- Foreign Talent Recruitment Program
- Guest Accounts
- Guidance Document
- Incident Confirmation
- Incident Manager
- Information Owner
- Information System
- Information System Owner
- Information Technology Asset (Asset)
- Information Technology Asset Custodian
- Information Technology Network
- Information Technology Resource (Resource)
- Information Technology Security Program Strategy
- Information Technology Service Provider
- Information Technology System (System)
- Information Type
- Integrity
- Interim Policy
- International Collaboration Activities
- Internet Connectivity
- Lobbying
- Lobbying Activity
- Local Area Networks (LANs)
- Malign Foreign Talent Recruitment Program
- Organizational Guidance
- Personally Identifiable Information (PII)
- Policy Document
- Privileged Accounts
- Protected University Data
- Related Procedure
- Responsible Official
- Risk Assessment
- Risk Management
- Root Accounts
- Safeguard Maturity
- Security Categorization
- Security Event
- Security Event
- Security Incident
- Security Incident
- Sensitive Information
- Service Accounts
- Standard User Accounts
- Student Employees
- Support Staff
- System Accounts
- Technical Staff
- Unit
- Unit
- University
- University Data
- University Employee (Employee)
- University Policies
- University Policy
- University Policy Director
- University Policy Office
- Usability
- User Account
- Users
- UT Location / Location:
- Virtual Private Networks (VPNs)
- Vulnerability Management
- Wide Area Networks (WANs)
- Wireless Networks (Wi-Fi)