Mobile Logo in White


Unsupported Operating System Exemption

An operating system is the backbone of a computer or mobile device. It handles all the communications between the hardware of the device and its environment, including the user interface, the applications, and any peripherals, such as printers and scanners. Operating systems are kept secure and running smoothly by applying patches, fixes, and services packs on a timely basis. Out-of-date operating systems can have vulnerabilities which can be exploited and used to compromise the computer or mobile device.

Similarly, when an operating system reaches its end of life, the manufacturer stops supporting it with the patches, fixes, and service packs necessary to keeping the device secure. At that point, the device and all its data become vulnerable to attack, abuse, and misuse. The compromised device can then have its data lost, the user credentials (username and password) stolen, and the device itself used to perform illegal activities by the attacker.

Because out-of-date operating systems can so be easily exploited, they represent a threat to the University and themselves, and must be upgraded or removed from operation and replaced with updated hardware and operating system software.

In situations where operational requirements do not allow the system to be upgraded, replaced, or retired, an exemption must be requested and steps must be taken to ensure that device does not represent a threat to the University. To address the system’s avenues of attack, this will include NO access to or from the Internet. All exemptions must be approved by the Chief Information Security Officer (CISO). Exemptions are granted based on a justifiable, verifiable business case, including appropriate documentation. Any exemptions that are granted will be for a maximum of one year, and must be reviewed for changing circumstances and must be renewed. Additionally, exemptions are considered on a per-device basis, with one request per device; bulk exemption requests will not be considered.

List of Supported Operating Systems

The overall exemption process is as follows:

  1. Requester gathers and provides documentation justifying the exemption (see list below)
  2. Requester submits request for exemption using the online exemption request form.
  3. The Chief Information Security Officer (CISO) makes the decision
  4. The CISO communicates the decision
    • Denial – notify the requester with an explanation for denial
    • Approval – notify requester, assign expiration date

Supporting documentation for the exemption request includes, but isn’t limited to:

  • Individual identifier for the device
  • Owning department, along with responsible personnel (dean/director/chair, requester, etc.)
  • How the device is currently being used
  • The reason(s) the device cannot be upgraded, retired, or replaced
  • A business case based on the above reasons
  • Any compensating controls put in place to reduce the risk of loss of the device and its data
  • Any supplemental documentation supporting the request
  • Manufacturer’s documentation
  • Regulatory requirements
  • Peer-supplied/reviewed examples of similar situations

Note: If you are not able to access the online form, download the form to your computer by right-clicking on this link: Exemption Request Form

  • Internet Explorer – “Save Target As …”
  • Firefox – “Save Link As …”
  • Chrome – “Save link as …”

1. Download the form to your computer (requires Microsoft Excel 2007 or later)

2. Read tab “1-Instructions Page”

3. Fill out tab “2-General Form”

4. Fill out tab “Unsupported OS”

5. Begin collecting the necessary signatures

For more information, please contact Information Security at grc@uthscsa.edu, or the Information Security Hotline at 210-567-0707.