Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity NewsEducation:UniversityGovernment: Federal, State and Local

Florida moves to restrict TikTok across university campuses

By Security Staff
multicolored digital text

Image via Unsplash

April 6, 2023

The Florida Board of Governors has issued an emergency proposed regulation aiming to ban the use of TikTok on university campuses. The regulation outlines the technology each university should ban and how the state plans to enforce those regulations.

TikTok has already been banned within several government buildings over data privacy concerns. To manage these concerns, each university has to appoint an information security manager (ISM). This appointment may be combined with other duties/positions and is responsible for administering the information security program/policies/procedures of their respective institution.

Each university must develop and annually review and update an information security plan. Each plan may be customized to meet the specific conditions at each university but shall be based upon best practices acquired from recognized national industry standards published by authoritative groups such as: National Institute of Standards (NIST), Information Systems Audit and Control Association (ISACA), International Organization of Standards (ISO), Center for Internet Security (CIS) or other nationally recognized information security organizations.

Each information security plan must address the following:

  • The creation of an information security risk management program which includes risk/self-assessment components.
  • Compliance with applicable federal and state laws and regulations related to privacy and security of data held by the institution.
  • Clarifying roles and responsibilities for safeguarding and use of sensitive/confidential data.
  • Creation and maintenance of an inventory of stores of sensitive/confidential information and who has access to such information.
  • Policies and procedures regarding access control and transmission of sensitive/confidential data with an emphasis on providing an auditable chain of custody and encryption.
  • Distribution of clear and documented procedures for reporting and handling security violations and the consequences for violating security policies and procedures.
  • Methods for ensuring that information regarding the applicable laws, regulations, guidelines and policies is distributed and readily available to computer users.
  • Processes for verifying adherence to the information security plan associated policies and procedures.

Each university must make its information security plan, IT audits, IT risk assessments and inventories of known stores of confidential data appropriately available to the Board's assistant vice chancellor of ITS upon request.

Universities must use a state-approved cyber threat prohibited technologies list. This list shall be a consolidated list originating from threat intelligence sources, including but not limited to the Federal Department of Homeland Security, the Federal Bureau of Investigations and the Florida Fusion Center.

Universities must implement the following protection protocol for identified prohibited technologies:

  • Prevent identified software network traffic over the university's network, including Wi-Fi.
  • Prevent installation of all identified software from university-owned devices.
  • Remove all identified technologies from university-owned devices or infrastructure.
  • Prevent the installation of any identified hardware within the university's infrastructure.

Universities may develop policies and procedures for granting exceptions for the use of identified technologies. Those policies and procedures must include the following components:

  • A requirement that specific criteria be identified and used for evaluating the need for an exception.
  • A requirement that exceptions be evaluated by the information security risk management program.
  • A requirement that all exceptions be reviewed and approved by the university's chief information officer or executive officer identified with similar duties.
  • A requirement that all exceptions be reviewed and approved by the university's information security manager (ISM).
  • A requirement that compensating security controls be identified and implemented to limit the risk posed by the specified software or hardware.
  • Exceptions must be reviewed annually using the defined exception process to determine if continuation is warranted.
KEYWORDS: campus security device security network security school cyber security TikTok

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • edu6-900px.jpg

    Proposal to Arm Teachers Moves Forward in Florida Senate

    See More
  • university-g5533a03c6_1920.jpg

    University of Illinois moves back to remote learning

    See More
  • university campus

    How to keep cybercriminals off university campuses

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing