U12, Restricted Software and Services

Information Security Standard

1. Introduction

  • 1.1 To protect the confidentiality, integrity, and availability of UBC Electronic Information and Systems, this standard restricts or recommends against the use of specific third-party Software Applications, including Mobile and Web Applications, that pose significant risks. These may include, but are not limited to, Software Applications that are flagged or restricted by the Government of Canada, the Government of British Columbia, provincial and federal Privacy Commissioners, and trusted cybersecurity sources.
  • 1.2 This standard applies to all Devices—no matter whether they are owned by the University, by the User, or by a third party—that access UBC Systems requiring a User Account, or Devices used for University Business.
  • 1.3 The Chief Information Officer has issued this standard under the authority of Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems Questions about this standard may be referred to information.security@ubc.ca.

2. Restricted Software and Services

  • 2.1 The table below sets out the list of restricted Software Applications and will be updated as required to address emerging risks.

    §ApplicationRestrictionScope of RestrictionClarifying NotesRestriction Effective Date
    2.1.1End of Life SoftwareRestrictedOperating Systems ApplicationsRefer to the Vulnerability Management standard2014-08
    2.1.2KasperskyNot recommendedAll ApplicationsThe restriction does not apply to accessing the research from Kaspersky Lab2023-10
    2.1.3TikTokNot recommendedMobile ApplicationSee Use of TikTok at UBC2024-09
    2.1.4DeepSeekUse and installation is restricted. UBC also blocks use on the University network.Web Application Mobile Application Desktop ApplicationThe restriction does not apply to downloading and making use of the DeepSeek model. See DeepSeek Restrictions at UBC2025-03
  • 2.2 The University may implement blocks or other measures to prevent the use or installation of restricted Software Applications.
  • 2.3 If a User wishes to use a Software Application in a way that is restricted, then a variance must be requested from the CIO, as per the Requesting Variances standard.

Related Documents and Resources

Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems

Vulnerability Management standard

Use of TikTok at UBC

DeepSeek Restrictions at UBC

Requesting Variances standard

Standard Last Revised: 2025-03

Page last updated on January 26, 2026


Urgent Message An exclamation mark in a speech bubble. Bluesky The logo for the Bluesky social media service. Bookmark A bookmark in a book. Browser A web browser window. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Time A clock. Chats Two speech clouds. E-commerce Cart A shopping cart. Facebook The logo for the Facebook social media service. Help A question mark in a circle. Home A house in silhouette. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Locked A locked padlock. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Pencil A pencil indicating that this is editable. Telephone An antique telephone. Play A media play button. Plus A plus symbol indicating more or the ability to add. Print A printer pushing out a piece of paper. Search A magnifying glass. Settings A single gear. Arrow indicating share action A directional arrow. Speech Bubble A speech bubble. Star An outline of a star. Twitter / X The logo for the X (aka, Twitter) social media service. User A silhouette of a person. Vimeo The logo for the Vimeo video sharing service. Youtube The logo for the YouTube video sharing service.