Summary
Information about software that have been reviewed and disapproved for use by the University of Alaska (UA), University of Alaska Anchorage (UAA), University of Alaska Fairbanks (UAF), and University of Alaska Southeast (UAS) students, faculty, and staff on university owned devices.
Body
Overview
Information about software that have been reviewed and disapproved for use by the University of Alaska (UA), University of Alaska Anchorage (UAA), University of Alaska Fairbanks (UAF), and University of Alaska Southeast (UAS) students, faculty, and staff on university owned devices.
Attention
Currently all software requests must be reviewed annually. However, we are working to eliminate this requirement in an upcoming version.
Unauthorized software is defined as software that has not been approved, licensed, or legally authorized for use on university systems. While some applications may offer 'personal use' licenses, these do not extend to university computers, as UA operates as a business entity. Using such software in a professional capacity exposes the University of Alaska to significant legal liability, financial risk, and security vulnerabilities.
The CIO Management Team (CMT) is responsible for all final decisions regarding the classification and restriction of unauthorized software. To maintain the integrity of our digital environment, university IT departments monitor for the presence of these applications. The current list of unauthorized software, as determined by the CMT, is provided below.
Unauthorized Software
| Software |
Unauthorized Reason |
Effective Date |
| insync |
Duplicative of existing software and adds unnecessary complexity; native technology solutions exist |
2023-10-27 |
| OpenClaw |
Security and Legal Risk; potential Intellectual Property/copyright concerns |
2026-03-03 |
| TeamViewer |
Security and Legal Risk |
2023-10-27 |
| WeChat |
Security Risk |
2023-10-27 |
| WhatsApp |
Security Risk |
2023-10-27 |
Need additional help or have issues
For support, requests may be submitted anytime using the appropriate Software Request form. Requests generate a Ticket which will be worked in order received and urgency by IT Employees with the knowledge and permissions to assist with the request.