|
Field |
Details |
|
Standard Owner |
UW-IT CISO |
| Required Review | UW VP for IT/CIO |
|
Approval Authority |
I&T Exec Com/board, CIO |
|
Date of Issue |
1/1/2026 |
|
Last Reviewed |
1/1/2026 |
|
Next Review Date |
1/1/2028 |
|
Document Number |
APS 2.6.STN-3.03 |
|
Related Policies |
Health Insurance Portability and Accountability Act; Family Educational Rights and Privacy Act; Gramm-Leach-Bliley Act; EO 63, APS 2.3, APS 2.6 |
To ensure the confidentiality, integrity, and availability of University data and systems, all University-owned or managed devices must use only supported operating systems and software. This standard defines requirements, timelines, and exception process for maintaining supported software environments.
This standard applies to all University-owned or University-managed physical and virtual systems that store, process, or transmit University data, regardless of their physical location or funding source. UW Medicine entities are excluded and instead are subject to standards published by UW Medicine Information Technology Services.
Compliance date for Servers: June 30, 2026.
Compliance date for other Information Technology Devices: December 30, 2026.
Information Technology Device: Any device, whether physical or virtual, capable of running an operating system or application software, including but not limited to servers, desktops, laptops, mobile devices, and virtual machines.
Server: An information technology device whose primary use is to provide services, data, or resources to other devices or users over a network. For the purpose of this standard, end user devices and Internet of Things devices are not servers.
Supported software: An operating system or other software, whether commercial or free, receiving regular or assured ongoing updates and maintenance. Software is considered unsupported when critical vulnerabilities in the software have been unaddressed by the vendor or maintainer for at least 90 days after disclosure.
Only supported operating systems and other software may be used on University Information Technology Devices.
| Role | Responsibility |
|---|---|
|
Chief Information Security Officer (CISO) or their designees |
Reviewing exception requests and determining whether to approve exceptions |
|
Chief Information Security Officer (CISO) or their designee |
Tracking all exception requests and exceptions in the Information Security Risk Registry |
| Chief Information Security Officer (CISO) or their designee | Reviewing this standard consistent with its review schedule and making appropriate updates in collaboration with representatives from distributed University IT staff |
|
Executive heads of major organizations or their designee |
Ensuring their information technology devices comply within the specified timelines |
|
Executive heads of major organizations or IT Directors or equivalents |
Requesting exceptions |
· None
| Date | Description | Author/Editor |
|---|---|---|
January 1, 2026
Andreas Bohman, VP & CIO