These restrictions are based on guidance from the Georgia Technology Authority (GTA) under the Data Location and Access Standard and the prohibited software and services standard.  These standards prohibit the use of certain applications, services, and hardware due to security risks related to foreign ownership, data access concerns, or ties to entities deemed hostile.

 

Prohibited Applications

  • Software: Including Kaspersky Lab, CloudWalk Technology, 1C Company
  • Services: Including TikTok, WeChat, Telegram, Webull

For a full list of software and services, view the Prohibited Applications for Georgia Tech Owned Devices KB article.

Prohibited Hardware

  • Vendors/Hardware: Including Lenovo, Huawei, DJI, ZTE

DOAS has been advised that Lenovo has been deemed a prohibited supplier. Effective July 1, no new purchases of Lenovo products may be processed, regardless of the purchasing method or vendor.  This includes purchases made directly through Lenovo as well as through third-party resellers or other procurement channels. Any existing purchases that have already been made may move forward as planned.  

For additional information and a full list of hardware and vendors, refer to the Prohibited Software & Services Policies, Standards, and Guidelines.

 

Enforcement

OIT’s Endpoint Infrastructure team has implemented enforcement across device management platforms:

  • Intune: Detection and removal policies to remove restricted applications
  • Configuration Manager: Configuration baselines and remediation rules
  • Jamf: Blocklists and user notifications for macOS/iOS

 

Exceptions

Governor of the State of Georgia is mandating that the list of applications included in these policies is not to be installed on any Georgia Tech owned devices without an exception policy request approval.

Resources

 

Online Resources Hub

  • Find and download widely available software.
  • Explore discounted/role-based software via the portal.
  • Access advanced resources for licensing, purchasing, and policy guidance.

 

Software Acquisition & Management

  • Licensing & Purchasing Policies
  • Request Forms & Intake Processes
Blank Space (xlarge)
(text and background only visible when logged in)
Blank Space (xlarge)
(text and background only visible when logged in)