Prohibited Technologies

On March 29, 2023, the State University System of Florida Board of Governors made an emergency amendment to regulation 3.0075 Security of Data Related Information Technology Resources, which prohibits the use of specified technologies. Florida International University is required to remove the identified technologies stated in the State University System (SUS) Prohibited Technologies List from any university owned devices and block associated network traffic of these technologies.

The prohibited technologies include:

  • Kaspersky
  • VKontakte
  • Tencent QQ
  • TikTok
  • WeChat

What should I do if I have a prohibited technology on an FIU owned device and will I still be able to connect to the application on FIU's network?

The prohibited technologies are not allowed to be downloaded, installed, or used on any FIU owned devices or used on FIU's network. Departments or units must immediately discontinue use and uninstall the prohibited technologies from any FIU owned devices. Furthermore, these prohibited technologies cannot be used to conduct university business, including for marketing and or advertising outreach.

For FIU affiliated TikTok accounts, we recommend you download your TikTok archive and consider channeling your content to other platforms such as Instagram. At this time, you will not need to delete the FIU Affiliated TikTok account. It can remain inactive to retain the @handle and content files.

Can prohibited technologies be used on personal devices?

We are strongly recommending our FIU community users not to install software such as TikTok and other software prohibited by the SUS regulation 3.0075 on their personal device. This recommendation is inclusive of users who receive a stipend from the university.

Per FIU's Cellular Phone Policy, some employees are provided a monthly stipend. It is strongly encouraged, especially for personal devices or cellular phones that fall into this category, to remove the prohibited technologies.

Please keep in mind that the information collected from you can be used for fraudulent activities and jeopardize an organization's network.