University-Wide EIT Information Technology Security Policies and Procedures

Size: px
Start display at page:

Download "University-Wide EIT Information Technology Security Policies and Procedures"

Transcription

1 University-Wide EIT Information Technology Security Policies and Procedures EIT-One FAMU 1

2 University-Wide EIT Information Technology Security Policies and Procedures EIT-One FAMU 2

3 EIT Information Technology Security Policies and Procedures Revisions This section of the document is for any and all changes in the form of a review, changes and modifications to the FAMU Information Technology Security Policies and Procedures. This document is a living document which, can change on a daily, weekly or monthly basis depending law, administration, auditing or past or present issues causing changes to the security at Florida A&M University. Section Reviewed or Changed Description of Modifications Date Change Occurred: Reviewed or Changed by: All Sections Created & First Review All Sections Second Review 08/14// /04/2006 Tim Pace Robert Seniors, Daniel Andrew Sharif Morrison All Sections Third Review 08/17/2006 Other EIT Staff Members All Titles & TOC All Sections Comply with Board of Trustees (BOT) Utilizing the 17F.000 subsection Headings Final Review and Document Adjustments 09/02/ /02/2006 Robert Seniors Tim Pace Larry Henderson Charles Ghini Rufus Little All Sections Submitted to Audit Compliance 09/05/2006 Internal/External Review All Sections Submitted to FAMU President and Executive Committee (Board of Trustee) 09/06/2006 Castell Bryant Larry Henderson Final Review and Approval All Sections Submitted FAMU Board of Trustee 09/07/2006 Final Review and Approval 3

4 17F.010 INTRODUCTION PURPOSE SCOPE OBJECTIVE MISSION STATEMENT DEFINITION OF INFORMATION SECURITY STATEMENT FROM MANAGEMENT F.020 EIT ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES UNIVERSITY DATA SECURITY AND PRIVACY ETHICAL USE OF COMPUTERS AND INFORMATION TECHNOLOGY RESOURCES PROPER USE OF INFORMATION RESOURCES, TECHNOLOGY RESOURCES AND NETWORKS POLICY ON ETHICAL USE OF SOFTWARE AND OTHER COMPUTING RESOURCES F.030 ROLES AND RESPONSIBILITIES ORGANIZATIONS ROLES & RESPONSIBILITIES Senior Vice President & Chief Information Officer (CIO) Information Technologies & Services Vice Presidents / Directors Information Security Manager (ISM) Department or Unit Managers and Supervisors Security Organization and Personnel Data Owners Information System Users (Employees, Consultants, Students) Information Technology Security Committee INFORMATION TECHNOLOGY STEERING COMMITTEE POLICIES AND PROCEDURES DEVELOPMENT TEAM USER ACCOUNTABILITY AND COMPLIANCE CONDITIONS OF USE FOR INFORMATION SYSTEM REPORTING OF SECURITY VIOLATIONS F.040 PERSONNEL SECURITY PRIOR TO EMPLOYMENT DURING EMPLOYMENT TRANSFER OF TERMINATION OF EMPLOYMENT INFORMATION ACCESS SECURITY CONFIDENTIALITY AGREEMENT FOR EMPLOYEES F.050 INFORMATION SYSTEM USER ACCESS AND AUTHENTICATION ACCESS TO COMPUTER RESOURCES USER LOGON ID S & USER IDENTIFICATION INFORMATION TECHNOLOGY PASSWORD MANAGEMENT INFORMATION TECHNOLOGY PASSWORD GUIDELINES INFORMATION TECHNOLOGY PASSWORD SYNTAX STANDARDS INFORMATION TECHNOLOGY "BATCH" PASSWORD GUIDELINES INFORMATION TECHNOLOGY SUPER PASSWORD POLICY RE-CERTIFICATION F.060 EIT INFORMATION TECHNOLOGY SYSTEMS, APPLICATIONS & DATABASES POLICY AND PROCEDURES EIT INFORMATION TECHNOLOGY SECURITY POLICY EIT INFORMATION TECHNOLOGY RESOURCES EIT ENVIRONMENT RESOURCES POLICIES EIT NETWORK POLICIES & STANDARDS Network Standards EIT Network Backbone

5 6.4.3 Providing Separate Networks Network Services EIT MAINFRAME ADMINISTRATIVE SYSTEMS PROCESS (NWRDC) PEOPLESOFT APPLICATION PeopleSoft IT Resources PeopleSoft Best Practices PeopleSoft Confidentiality ACCESS TO DATABASE POLICIES Storage of Database User Names and Passwords Retrieval of Database User Names and Passwords Access to Database User Names and Passwords LAPTOP/PORTABLE COMPUTER SECURITY GUIDELINES Physical Security Information Security PERSONAL HOME COMPUTERS: F.070 COMMUNICATIONS SECURITY PROTECTING HIGHLY SENSITIVE AND CRITICAL UNIVERSITY COMMUNICATIONS VIRTUAL PRIVATE NETWORK (VPN) POLICY ROUTER SECURITY POLICY EIT TELECOMMUNICAITON ROOMS (CLOSETS) DIAL-UP MODEMS WIDE-AREA NETWORKS SECURITY ENCRYPTION ELECTRONIC COMMERCE (E-COMMERCE) INTERNET SECURITY ELECTRONIC MAIL SECURITY Communication Policy Electronic Mail Requirements and the Public Records Act Legal custodian of an Message Types of Messages Procedures for Compliance with the Records Retention Requirement of the Public Record Law ANTI-SPAM POLICY REMOTE ACCESS SECURITY VIRUS POLICY & PREVENTION Additional Precautions Users Should Take Virus Scanners and/or Detection Program F.080 PHYSICAL SECURITY COMPUTER ROOM ACCESS/SERVER ACCESS COMPUTER ROOM SAFETY AIR CONDITIONING AND ELECTRICAL DATA STORAGE F.090 HARDWARE AND SOFTWARE SECURITY COMPUTING FOR FAMU APPROVED PURPOSES HARDWARE AND SOFTWARE ACQUISITION, INSTALLATION AND MAINTENANCE DESKTOP STANDARDS AND POLICY OTHER INFORMATION TECHNOLOGY ORDERS FROM DEPARTMENTS CELLULAR PHONE USE POLICY OWNERSHIP OF SOFTWARE POLICY PHYSICAL SECURITY OF UNIVERSITY'S PROPERTY DOWNLOADING DATA AND REQUESTERS RESPONSIBILITIES F.100 SYSTEM MONITORING. 67 5

6 10.1 SECURITY AUDIT LOGS LOGGING OF SECURITY VIOLATIONS Logging and Audit Trails Reporting Network Security Internet / Intranet Dial-Up Access Security LOGGING AND AUDIT TRAILS REQUIREMENTS Reconstruction of Events Information to be Recorded Tracing Transactions Support Information Retention Period Documentation / Audit Trail Data JOB RELATED DATA LOGS Program Related logs Operating Systems File logs Application System logs Transaction Batch logs Online Transaction logs Message Related logs Database Related logs SATISFACTORY COMPLIANCE REPORTING SECURITY VIOLATIONS SECURITY VIOLATIONS DISCIPLINARY ACTIONS Enforcement RISK ASSESSMENTS AND ANALYSIS Risk Assessments & Analysis Effectively Safeguard Against Vulnerabilities Unauthorized Disclosure of Sensitive Information Denial of Service or Use Unauthorized Manipulation of Information Unauthorized Use Roles and Responsibilities within Risk Management Program Requirements Frequency Relationship to Effective Security Design Selection of Safeguards Request of Waiver RISK ANALYST PROGRAM BASIC ELEMENTS Threat and Vulnerability Analysis Exposure Analysis Calculation of Annual Loss Expectancy Countermeasure Evaluation and Selection Cost/Benefit Analysis Selection of a Countermeasure Management Decision Control Implementation Effectiveness Review F.110 THIRD-PARTY AND OUTSOURCING SERVICES SERVICE CONTRACTS OUTSIDE CONTRACTORS AND NON-DISCLOSER AGREEMENTS SERVICE AGREEMENTS APPLICATION SERVICE PROVIDERS (ASP) POLICY Outsourced must be Evaluated Requirements of the Application Service Provider 87 6

7 11.5 VENDOR SELECTION CONSULTANTS AND CONTRACTORS.88 17F.120 INFORMATION CLASSIFICATION POLICY INFORMATION CLASSIFICATION RESPONSIBILITIES CATEGORIES OF INFORMATION SENSITIVITY / CRITICALITY OF DATA AND INFORMATION HANDLING AND CONTROLS OF DATA AND INFORMATION Disposing of Computer Generated Documents Containing Confidential Information COMPUTER DISPOSAL POLICY AND GUIDELINES Security Processing for University Redistribution or Salvage SECURITY PROCESSING FOR MAGNETIC TAPE AND MEMORY DEVICES DATA ELIMINATION GUIDELINES SOFTWARE SCRUBBING DISSEMINATION OF FAMU DATA AND INFORMATION CLASSIFICATION OF APPLCIATIONS AND PLATFORMS F.130 BACKUP AND STORAGE POLICY TARGET ENVIRONMENT POLICIES AND PROCEDURES END-USER DATA (INFORMATION CLASSIFICATION LEVEL 0) NORMAL DATA (INFORMATION CLASSIFICATION LEVEL 1) CRITICAL DATA (INFORMATION CLASSIFICATION LEVEL 2) ESSENTIAL DATA (INFORMATION CLASSFICATION LEVEL 3) OFFISITE STORAGE AND BACKUP RESTORES.95 17F.140 COMPUTER LAWS THE PRIVACY PROTECTION ACT OF THE COMPUTER FRAUD AND ABUSE ACT THE COMPUTER VIRUS ERADICATION ACT OF THE ELECTRONIC COMMUNICATION PRIVACY ACT CDA COMMUNICATION DECENCY ACT WEB COPYRIGHT LAW COPA CHILD ONLINE PROTECTION ACT DIGITAL MILLENNIUM COPYRIGHT ACT OCT 28, F.150 SECURITY AWARENESS CREDENTIALING OBJECTIVES AUDIENCE CATAGORIES INFORMATION SECURITY ORANIZATION AND SYSTEM ADMINISTRATORS INFORMATION SYSTEM USERS CREDENTIALING LEVELS CREDENTIALING TOPICS Information Security Basics What is Information Security? How are you involved with Information Security? Threats and Vulnerabilities of Information Systems SECURITY AWARENESS PRACTICES INFORMATION SECURITY POLICIES, STANDARDS, PROCEDRUES AND GUIDELINES F.160 BUSINESS CONTINUITY PLANNING (Secondary Doc TBA) F.170 DISASTER RECOVERY DOCUMENT (Secondary Doc TBA) F.180 FORMS AND PROCEDURES (TBA) F.190 GLOSSARY OF TERMS

8 17F.010 INTRODUCTION 1.1 PURPOSE Information is a valuable university asset. The purpose of the Information Security Policies and Procedures is to establish responsibilities and minimum requirements for the protection of Florida A&M University information assets, computer systems and facilities. These policies were created in order to prevent misuse and loss of assets, establish the basis for audits and self-certifications, and preserve management s perspectives and legal remedies in the event of information asset loss or misuse. The cost of these safeguards must be appropriate to the value of the assets so protected. 1.2 SCOPE This document conveys mid-level policies, standards, and procedures. It is intended to be the basis for the development of specific procedures and guidelines which encompass particular information security for system platforms and applications. This document applies to the integrity, confidentiality and availability of information obtained, created or maintained by Florida A&M University employees. For the purpose of this document, information shall include data or unprocessed information which may become information when processed by computer applications. The definition of information includes paper documents and all computer-related processing activities involving mainframes, micro and mini computers. The Information Technology Security Policies and Procedures shall apply to all Florida A&M University employees, contractors and consultants acting as authorized agents of Florida A&M University in all locations. They shall also apply as appropriate to employees and agents of other corporations or organizations whom may be directly or indirectly granted access to information associated with Florida A&M University business operations. The following definitions will apply when used in this manual: 8

9 Policy A policy is a broad statement of principle that presents management's position for each defined control area. Policies are interpreted and supported by standards, guidelines and procedures. Policies are intended to be long-term and guide the development of rules to address specific situations. Standard Guideline Procedure Information Systems Availability A standard is a rule that specifies a particular course of action or response to a given situation. Standards are mandatory directives to carry out management's policies and are used to measure compliance with policies. A guideline is a statement that recommends or suggests conduct in a specific situation. Guidelines are essentially recommendations to consider when assessing the particular level of security needed for each information system. They are to be followed unless there is a documented and approved reason to exclude them. A procedure documents a plan of action for how a standard or guideline will be implemented in a given part of the organization. Procedures may be developed by division, at the local level or by specific system, under the direction of the system owner. The Florida A&M University Local Information Security Officers (Information Security Officers) are responsible for reviewing and approving procedures to ensure that they fully support the Florida A&M University Information Security Policies, Standards, Procedures, and Guidelines. The computers, communications facilities, networks, data and information that may be stored, processed, retrieved or transmitted by them, including programs, specifications and procedures for their operation, use and maintenance. The characteristic of data, information and information systems being accessible and usable on a timely basis in the required manner. Confidentiality The characteristic of data and information being disclosed only to authorized persons, entities and processes with a right to know at authorized times and in an authorized manner. Integrity The characteristic of data and information being accurate and complete and the preservation of accuracy and completeness. 9

10 1.3 OBJECTIVE The objective of the Information Security Policies and Procedures are as follows; To ensure that Florida A&M University information assets are protected adequately on a cost-effective basis and to a level that allows Florida A&M University to fulfill it s mission and operate within acceptable levels of risk to information assets To provide a mandate to all individuals employed by Florida A&M University to properly handle and protect the information that they have access to in order for Florida A&M University to be able to properly conduct its business and provide services to its staff and students To provide written documentation of indication of the statutory provisions that should be adhered to by all employees and students at the university To establish policy for the means by which information exchanged by the university and its employees and students and other parties will be controlled and safeguarded To create and implement an appropriate level of information security awareness within the university. 1.4 MISSION STATEMENT Florida A&M University recognizes its dependency on data, information, and computer systems used to facilitate effective operation of our business in serving the needs of our customers which includes students, employees, consultants, temporary staff, vendors and agencies. We also recognize the value of the information we maintain and provide to our students, employees, agencies and others. It is, therefore, essential that this data, information, and the manual and technical infrastructure that supports it, is secure from destruction, corruption, unauthorized access and breach of confidentiality whether accidental or deliberate. 10

11 1.5 DEFINITION OF INFORMATION SECURITY Florida A&M University holds and manages information which by its nature is proprietary to the successful operation of the university and therefore represents valuable assets of the university, which need to be protected. Additionally, others share information with Florida A&M University which is of a confidential nature, and for which there may be a legal obligation to maintain that confidentiality. The Information Security Policies and Procedures provide a basis for how Florida A&M University will establish controls and manage this information and the responsibilities of individuals handling that information. The policy defines a set of standards, procedures and controls to be used as common practice within Florida A&M University to protect the university information from unauthorized access, disclosure, accidental or deliberate modification, and loss of availability or use. 1.6 STATEMENT FROM MANAGEMENT The letter attached below was written by Larry W. Henderson, Vice President of Enterprise Information Technology / CIO to the Florida A&M University Campus Community. It address all individuals that utilize information technology on the FAMU Campus from employee s to students and to fully notify of the creation of written security policies, procedures, standards and guidelines to be utilized by all FAMU College students, employee s and consultants who utilize Enterprise Information Technology (EIT) Resources. 11

12 Florida Agricultural and Mechanical University Tallahassee, Florida TO: FROM: The Florida A&M University Campus Community Larry W. Henderson, Vice President, Enterprise Information Technology/CIO SUBJECT: Information Technology Policies and Procedures DATE: July 17, 2006 The Florida A&M University Enterprise Information Division has developed written guidelines regarding the Security Policies and Procedures in support of Information Technology related services and practices. The purpose of the policies and procedures is to serve as an oversight and governance for handling of issues, policies and guidelines that have an impact on, relate to, or part of the University Computing Technology Environment and Infrastructure. The EIT Division manages the University's computer networks and accessibility to the Internet; and Web services; Our FAMU Student Information System; Video and Web Conferencing; and Telephony Services. The Enterprise Information Technology Division is responsible for the acquisition, installation, configuration, maintenance, management and administration of all data, networking and infrastructure components serving the FAMU campuses and remote FAMU users. Consequently, all network additions and modifications of any type, including minor renovations must receive written approval from the EIT Network Director. Enterprise Information Technology (EIT) Division s mission is to provide effective, efficient and reliable access to emerging technology resources for students, faculty, and staff in the quest for knowledge, applying the power of such technology to unite people and content anytime, anyplace. The security and integrity of the University s computer systems, campus networks, and telephone services is our collective responsibility. As we increasingly rely on electronic means of communication and electronic access to important data and information, we must ensure their reliability and protect our environment against ever more sophisticated security threats. The process of developing the Information Technology related Policies and Procedures by the EIT staff based on their functional area of responsibility within the Division. Once the draft documents are developed, the University s Enterprise Information Security Committee reviews, edits, and recommend the policies and procedures for the review and approval of the Enterprise Information Technology Steering Committee. Once the policies are approved by the EIT Steering Committee, the policies are submitted to the Board of Trustees for adoption and University-wide dissemination. The establishment of the EIT related policies and procedures affords the University with the opportunity to maintain the highest level of awareness, guidance, compliance and governance for use of FAMU technology resources and services. 12

13 17F.020 EIT Acceptable Use of Information Technology Resources 2.1 University Data Security and Privacy This policy establishes data security standards and practices for the protection of University administrative, financial and student data from unauthorized disclosure. Protecting the security of university information and information systems is the responsibility of every member of the university community. Each faculty, staff, and student is responsible for knowing and complying with published Information Technology (IT) policies and procedures. Such policies and procedures include the Ethical Use of Computers and IT Resources, Proper Use of Information Resources, Technology Resources and Networks and Information Security Policy. In addition, individuals are required to know and comply with additional security practices established by colleges, departments or other units. Failure to comply with these policies and practices may result in loss of computing privileges and/or disciplinary action. Florida A&M University provides access Information systems within the University that contain data necessary to conduct the business of the institution. This data are institutional resources and must be protected from unauthorized modification, destruction, or disclosure, whether accidental or intentional. The Information Technology Division is responsible for the development of policies regarding the security of collecting, accessing, maintaining, usage, or disseminating of University data. It is the responsibility of all levels of management to ensure that all University administrative data users within their area of accountability are aware of their responsibilities as established by this policy, and for guaranteeing a secure office environment and computer equipment with regard to University data Adhering to applicable federal and state laws and University policies and procedures concerning storage, retention, usage, release, transportation, and destruction of data Adhering to administrative University data security and access standards as described in University to fulfill the performance of their job functions and responsibility Exercising due care to protect University computing equipment that stores data from unauthorized use, disclosure, alteration, or destruction Data custodians and users are responsible for all transactions occurring during the use of his/her User ID and/or password when accessing computing equipment A workstation that is logged into the network must not be left unattended The sharing of passwords and/or use of a computer account that is used to access data is prohibited. 13

14 Any Violations of this policy will result in the appropriate disciplinary action, which may include loss of computing privileges, suspension, termination, or expulsion from the University, and legal action. In addition, any violations of any federal, state, or local law concerning the unauthorized access or use of University computers and computing services will result in the appropriate disciplinary action up to, and including termination from the University. 2.2 Ethical Use of Computers and Information Technology Resources A focus on the issues related to ethics in the use of computing resources, especially software has occurred within the FAMU community for several years. In addition, there has been intense national interest and concern stimulated in part by legal cases involving unauthorized use of copyrighted materials, both hardware and software, by large corporations competing in the marketing of information technology in higher education. The concern for ethical use of computing resources remains very high. Much of the focus on ethical use of computing by colleges and universities results from the self assumed trusteeship for standards of intellectual honesty, and the vanguard role these institutions have chosen to play in the protection of privacy of faculty, students, and alumni. Computer software is essential to the effective operation of many programs and services of the University. Such software is intellectual property and the copyright and terms of license of use of this type of property must be strictly adhered to by all university employees as they engage in work for the University. Students are often required to utilize software licensed to the University as well as other computing resources. Many uses of university software by students are of a voluntary nature, i.e., use by students to enhance the learning experience. During any use of software and other computing resources of the University students are required to adhere to the conditions specified in the licensing agreement by which the University has acquired use of the computer software or other computing resource. To guide students and employees in their use of software licensed to the University (or otherwise brought into the programs and operations of the institution), a Florida A&M University policy statement on the ethical use of software and other computing resources has been developed and adopted. It is set forth below. 2.3 Proper Use of Information Resources, Technology Resources and Networks It is the policy of Florida A&M University to maintain access for its faculty, staff and students to local, national and international sources of information and to provide a framework environment that encourages access to knowledge and information. It is the policy of the University that information resources will be used by members of its University with respect for the public trust through which they have been provided and in accordance with policy and regulations established from time to time by the University and its operating units. As a member of the University, you may not assume another person s identity or role through deception or without proper authorization. You may not communicate or act under the 14

15 guise, name, identification, address, signature, or indicia of another person without proper authorization, nor may you communicate under the rubric of an organization, entity, or unit that you do not have the authority to represent. Access to the information resource infrastructure both within the University and beyond the campus, sharing of information, and security of the intellectual products, all require that each and every user accept responsibility to protect the rights of the University. Any member of the University who, without authorization, accesses, uses, destroys, alters, dismantles or disfigures the University information technologies, properties or facilities, including those owned by third parties, thereby threatens the atmosphere of increased access and sharing of information, threatens the security within which members of the community may create intellectual products and maintain records, and in light of the University s policy in this area, has engaged in unethical and unacceptable conduct. Access to the networks and to the information technology environment at the Florida A&M University is a privilege and must be treated as such by all users of these systems. To ensure the existence of this information resource environment, members of the University will take actions, in concert with State of Florida and Federal agencies and other interested parties, to identify and to set up technical and procedural mechanisms to make the information technology environment at the Florida A&M University and its internal and external networks resistant to disruption University Regulations and Guidelines This policy is applicable to any member of the University, whether at the University or elsewhere, and refers to all information resources whether individually controlled, or shared, stand alone or networked. Individual units within the University may define conditions of use for facilities under their control. These statements must be consistent with this overall policy but may provide additional detail, guidelines and/or restrictions. Where such conditions of use exist, enforcement mechanisms defined therein shall apply. The University characterizes as unethical and unacceptable, and just cause for taking disciplinary action up to and including non-reappointment, discharge, dismissal, and/or legal action, any activity through which an individual: Violates such matters as University or third party copyright or patent protection and authorizations, as well as license agreements and other contracts, Interferes with the intended use of the information resources, Seeks to gain or gains unauthorized access to information resources, Without authorization, destroys, alters, dismantles, disfigures, prevents rightful access to or otherwise interferes with the integrity of computer-based information and/or information resources, Without authorization invades the privacy of individuals or entities that are creators, authors, users, or subjects of the information resources. 15

16 2.3.2 Downloading and Viewing of Obscene Materials Viewing and/or printing obscene material in University offices, public labs or University equipment is specifically prohibited unless being conducted for official university business. Using a computer, computer system, computer network, or any other University property for the creation, design, manufacture, preparation, display, or distribution of any written or graphic obscene material is prohibited. Unauthorized or fraudulent use of any University Information Technology Resources can result in a felony prosecution as provided for in Florida Statutes, Chapter 775 of the Florida Criminal Code. 2.4 Policy on Ethical Use of Software and Other Computing Resources Computing resources at Florida A&M University are allocated for the use of students, faculty, and employees in the instruction and research programs at the institution, and in performing the duties and responsibilities of employment so as to effectively support the operations of the University. Other use of computing resources shall occur only upon appropriate authorization by the VP of Information Technology or designee.. The University does not condone unauthorized use of any of its computing resources inclusive of: use for personal profits; attempts to gain access to files for which permission to enter has not been granted; copy of proprietary software without licensed approval; attempts to impair performance of computing resources; and, use for purposes of harassment. As an institution of higher learning, the University is especially cognizant of its responsibility as a trustee for integrity and honesty in academic discourse. Given a mission to foster intellectual activity and scholarship, coupled with an awareness of the easy by which electronic works can be reproduced, the University has a particular responsibility to convey that it does not condone the duplication or distribution of software in violation of copyright or license agreement. The University reserves the right to sanction its students, employees, and others to whom it may have granted access to computing resources, for such violations. Florida A&M University recognized that respect for creativity, intellectual labor, and discovery arising from scholarly undertaking, is fundamental to its mission. The University further recognizes that only through strongly adhering to principles of academic honesty, will it achieve the goals it has set for excellence in higher education. Careful consideration has been give to issues that involve ethics in computing and ethics in utilization of computing resources. Therefore employees and students are expressly advised that the above policy give the university great latitude in the sanctions it can impose on employees and students. Such sanctions can range from warning or reprimand to termination in case of violations by employees. Violations of the policy by students can result in a broad range of sanctions including denial of access to computer resources or expulsion from the University. The above University statement was developed for consideration as University policy by a 16

17 subcommittee of the University administrative users group. The statement was reviewed by the appropriate campus groups and adopted as a policy statement by the University. The formally adopted form of the above policy statement has been disseminated broadly on campus. In addition, the student handbook, faculty manual, and other pertinent documents, will carry the policy statement. Other more specific notices will appearing the computing newsletter and in the student newspaper Violations of Computer Ethic There is regular and broad distribution to students and employees of acts that violate the FAMU ethics in computing policy. The following list identifies only some of the acts that are a clear violation of the policy. Students, faculty and staff are encouraged to avoid the following: Copying of software in violation of terms of the license held by the University installation of software on university owned computers in violation of the license held on the software; Unauthorized access to files on university computers; Destruction of university computing resources (this includes hardware and software); Use of university computing resources to harass employees or students; Use of university computing resources to commit any computer crime Unauthorized use of university computers and software; Unauthorized relocation of computer software or computer hardware; and The intentional use or operation of computing resources in a way that will impair the performance of a university computing resource inclusive of computer networks. The university will further develop and strengthen policies and procedures to assure an environment with ethical practices that is implemented by adequate dissemination of those rules, regulations and procedures. 17

18 17F.030 Roles and Responsibilities This section identifies the various roles and responsibilities within Florida A&M University related to the protection of information system resources. 3.1 Organizations Roles & Responsibilities Senior Vice President & Chief Information Officer (CIO) The Senior Vice President & Chief Information Officer is responsible for all matters related to the management and control of the university s computing and telecommunication resources and will institute university-wide policies and procedures in connection with this responsibility. The Senior Vice President & Chief Information Officer is responsible for the following general functions: Meeting the University s information service needs through the use and development of the necessary computing and telecommunication systems as determined by business need and enabled by technology advancements (both hardware and software) Maintaining a secure, reliable and economic operation of the University s computing and telecommunication system environments Planning, budgeting, and implementing the various computing and telecommunication system enhancements as required and determined by business need and enabled by technology advancement Developing, providing and enforcing the policies and procedures governing the computing and telecommunication systems use Information Technologies & Services Vice Presidents / Directors The Information Technologies & Services Vice Presidents and/or Directors provide primary support for computer and communications hardware and software for product determination, acquisition, installation, configuration, maintenance, upgrading and training. The VP s of EIT primary responsibilities include: Providing on-going expert technical support and advice by establishing support teams Maintaining a help desk to serve as a single point of contact for all computer and communications support requirements Providing centralized, physically and logically secure platforms for information asset storage and transport. 18

19 Designing, implementing, integrating and maintaining all computer applications Providing and maintaining effective information asset control facilities Providing an information-asset backup service Maintaining up-to-date equipment and software inventories Advising staff on information-asset security practices Information Security Manager (ISM) The Information Security Manager reports to the CIO. The ISM has primary responsibility for the oversight of the state of information security at the University and is charged with the definition of security strategy and scope. The ISM develops, recommends, and monitors Florida A&M University s Information Security Policies, Standards, Procedures, and Guidelines. Duties include directing the activities of the corporate information security function with regard to researching and evaluating security for mainframe computer systems, end user/personnel computing systems, departmental computers and communications facilities Drafting of information security policies and procedures Reporting on the state of information security Performing oversight of the security efforts of area managers, security engineers and other security related specialists as appropriate; insuring adherence to operations related security policies and procedures Serving as primary point of contact for auditors during formal audit processes Preparing formal responses and action plans pursuant to internal audits Identifying individuals responsible for security engineering functions outsourced Reviewing operations related to security Performing annual risk assessment based on CobIT 3 standards included by reference and will be complied with except where superseded by University approved procedures Evaluating and adjusting the University information security program in light of its annual risk assessment Providing Security Awareness Training for University employees and students. 19

20 3.1.4 Department or Unit Managers and Supervisors Each Florida A&M University Managers and Supervisors are responsible for security as it relates to the following items: Distributing information regarding the Ethical Use of Computer and IT Resources Identifying and protecting information assets within each assigned area of management control Ensuring that these assets are used for management and University approved purposes only Ensuring that all employees understand their obligation to protect these assets Periodically monitoring use of computers and IT resources for potential violations Ensuring effective use of access control facilities Ensuring that all employees are aware of and comply with the information security policies and procedures Authorizing access on a need-to-know basis for management-approved purposes Implementing division and department specific security practices and procedures which are consistent with the information security policies and procedures Noting variances from established security practice and initiating corrective action Conducting self, students and staff assessments for compliance Ensuring that employees who encrypt documents provide the necessary decryption keys to the appropriate people (e.g. ISM, Information Security staff team member) Notification of violations of this policy should be reported immediately to the Division of Information Technology, Information Security Manager. The University will make every effort to maintain confidentiality to the extent possible consistent with other obligations Security Organization and Personnel The security organization consists of appointed individuals whose primary responsibilities are related to security and supporting the ISM, including the following task items: 20

21 Establish and maintain information security policies, standards, procedures, and guidelines Perform certifications checks for user access privileges Administrate access control software Perform certification checks to ensure that systems, telecommunications, servers, networks all meet security and control standards Provide support and knowledge to the university as it pertains to Information Security Identify owners of data entities to ensure maintenance of their integrity Assistance to the Information Security Manager to ensure compliance is met Monitor security and investigate security violation attempts Review data security of the existing data structures Review logs, audits and other outputs to ensure proper action is taken for any security violations against established security policies and procedures Data Owners All Florida A&M University data processed by computer systems shall have a designated owner. The owner of the data has the responsibility to: Ensure that users are aware of the organization s information security policies, standards, procedures, and guidelines associated with the data Maintain the data they own with proper backups and government of the data Maintain the users whom are granted access to their data Verify that systems meet user requirements Ensure that system users are trained and specific controls for the information s use and the control requirements for the data s use are communicated Ensure that an annual risk assessment of each system is completed and the data processing system have been assigned a classification sensitivity level in accordance with the levels described in this document. 21

22 Authorize users to access their data Ensure that business continuity plans are in place and can recover information systems on a timely basis in the event of a disaster Information System Users (Employees, Consultant, Students) Employees of Florida A&M University who have received permission from data owners to access the owner s data are considered users of information systems. All users must demonstrate a business need to access the desired information in order for access to be granted. It is the responsibility of information system users to: Use information systems for authorized business purposes only Comply with university security policies, standards and guidelines as well as any procedures specified by the data owner. Participate in the testing of the business continuity plans as necessary Prevent unauthorized disclosure of data Report security exposures, misuse or non-compliance situations to management Protect the confidentiality of their user IDs and passwords Notification of violations of this policy should be reported immediately to the Division of Information Technology, Information Security Manager. The University will make every effort to maintain confidentiality to the extent possible consistent with other obligations. 3.2 Information Technology Security Committee The IT Security Committee supports the IT Security Manager and his staff. The performance of his tasks by coordinating measures which impact the entire organization, compiling information and performing supervisory tasks. The precise shape of the team will depend on the size of the organization concerned, the aspired-to level of IT security and the available resources. In extreme cases the IT Security Committee may consist of only one person, the CIO who in this case is responsible for all the tasks in the IT security process. In order to be able to carry out its tasks effectively, the IT Security Committee members should have knowledge of IT security, technical knowledge of IT systems and experience in organization and administration. In addition, the IT Security Committee should reflect the different operational areas within the organization Specifying IT security objectives and strategies and developing the Information Security Policy, 22

23 3.2.2 Reviewing implementation of the Information Security Policy, Initiating, directing and monitoring the IT security process, Helping to draw up the IT security concept, Examining whether the IT security measures planned in the Information Security Policy function as intended and are appropriate and effective, Approving the IT security measure implementation plan and making available the necessary resources, Preparing the program of IT security and IT security awareness promotion training courses, and advising the IT Coordination Committee and Management on IT security issues. IT Security Committee should include an IT staff member, the IT Security Manager (ISM) and an IT user representative. If a similar body already exists in the organization, its tasks could be extended accordingly. However, to underline the importance of IT security it is advisable to set up an IT Security Committee and to place at its disposal the resources it needs. 3.3 Information Technology Steering Committee The EIT Steering Committee is a group of individuals responsible for general IT operating policy, procedures, and related matters affecting the FAMU enterprise as a whole. It is the committee responsibility to make recommendations for program initiatives and funding. The statutes also charge the Steering Committee with establishing guidelines and policies for 7/20/2006IT operation and management to include: databases, hardware and software, setting of standards, education, and general coordination of IT development. 3.4 Policies and Procedures Development Team Security Development Team provides a uniform set of information security policies, standards and general guidelines for Florida A&M University. All, unless specifically exempted, are required to abide by the policies hereby established. All users (employees, students, contractors, vendors, and other parties) are expected to understand and abide by them. 3.5 User Accountability and Compliance All employees, contractors, students and consultants are required to become familiar with and acknowledge compliance with the security policies in this document. Security violations will result in corrective action by management. Disciplinary action will be consistent with the severity 23

24 of the incident, as determined by an investigation. Disciplinary actions may include, but are not limited to: Loss of access privileges to data processing resources Dismissal of consultants Cancellation of contracts Termination or suspension of employment Civil and/or criminal prosecution or other actions as deemed appropriate by management if the security violation: Exposes the company to actual or potential monetary loss through the compromise of data security or damage and loss of computer equipment The access and/or use of Florida A&M University information system resources for functions unrelated to business activities, unauthorized removal of data from the company (e.g., removal of tapes or diskettes), unauthorized access to programs, files and data or any other event that would compromise the security of Florida A&M University information systems Involves the disclosure of trade secrets, intellectual property, confidential information or the unauthorized use of corporate data Involves the use of data for illicit purposes, which may include violation of any law, regulation or reporting requirement of any law enforcement or government body 3.6 Conditions of Use for Information System Users may not provide their own information systems or computers. The Enterprise Information Technologies and Services is responsible for hardware and software product determination and selection, including budgeting and cost/benefit analysis. The EIT will team will with system users to determine the appropriate information-processing system required for each user. The ITS will also install, configure, maintain and upgrade all computer and communications hardware and software. Employees, temporary and consultants who must use computer equipment to do work off site will be provided the necessary equipment to meet their needs. It is the responsibility of each system user to use information systems provided by the university for valid business use only. Users should be aware that systems are periodically backed-up and retained. In addition, Florida A&M University Management and Internal Audit reserve the right to 24

25 review, audit and observe all data files stored on any university computer systems and data processing resources used to support business activity. 3.7 Reporting of Security Violations All employees, consultants, students and temporary staff members of Florida A&M University are responsible for maintaining a familiarity with the information security policies and procedures are responsible for reporting any suspected security breaches or violations. Employees who suspect a security breach or violation will communicate their concerns to their direct supervisor. If this is not possible, employees must report the alleged violation to their business manager or Human Resource Department Representative. These parties must then evaluate the allegations and refer severe violations to the Information Security Officer. The Information Security Officer is responsible for establishing periodic security monitoring review schedules to detect unauthorized attempts to access university computers. The Information Security Officer will determine when the reviews will occur and who will perform them. 17F.040 Personnel Security This section addresses how data security controls are integrated into the hiring, transfer and termination of employees. This area of data security is critical since employees are ultimately responsible for controlling the dissemination of Florida A&M University maintained information. 4.1 Prior to Employment The Human Resources Department shall subject all employees of Florida A&M University preemployment screening, which may include background investigations. In addition, the Human Resource Department will facilitate secure and confidential information handling policies when introducing new individuals to the company. All new employees will receive a copy of the information security policies and procedures, and guidelines and/or security awareness materials appropriate for their position and role within the university and acknowledge in writing that they understand their responsibilities as stated in the policies. 4.2 During Employment University will consider an employee's chronic problems adhering to security policies and procedures during the performance evaluation process. Assign a liaison for each consultant who is responsible for ensuring that they comply with all University security policies and procedures. Provide training to employees upon changes in security policies or procedures. 25

26 4.3 Transfer of Termination of Employment The Human Resource Department shall immediately notify the Information Security Manager upon the resignation or termination of employees, consultants, contractors and students. Upon notification of transfer or termination, the EIT Information Security Organization shall ensure that the user ID access is revoked or modified immediately Require that all PCs, Keys, ID, cards, software, data documentation, manuals etc.. are returned to the employees direct Manager or Supervisor or if a student items must be returned to a Departmental or Unit Manager at the University Upon termination of employees, consultants, temporaries or students, all materials must be inspected if they are to be removed from the campus premises An established proper procedure will be documented for the removal of employee, consultant, temporary or student by having terminated for a cause. Depending on the nature of the termination, the former employee, consultants, students and others will be subject to varying levels of observation and escort from the University premises For situations where users with access to highly sensitive or critical information are terminated, the employee s supervisor is responsible for directly coordinating with the Information Security Manager to ensure proper remove the user s access rights. 4.4 Information Access Security The Human Resource Department shall be responsible for the initiation of new or transfer employees, consultants or vendor access requests. The employee s manager must report changes in employee status immediately to the Human Resource Department. For situations where users with access to highly sensitive information are terminated, the employee s manager is responsible for directly coordinating with the Information Security Officer and Human Resource Department to remove the user s logical and physical access rights. 4.5 Confidentiality Agreement for Employees University situations where users with access to highly sensitive information are terminated, the employee s manager is responsible for directly coordinating with the Information Security Officer and Human Resource Department to remove the user s logical and physical access rights 26

27 Florida A&M University PSII Information Service & System Confidentiality Agreement For Consultant/Vendor/Employee I understand that FAMU student, employee, employer, and financial information from any source and in any form is confidential and is available to me solely for the performance of my official duties as a Florida A&M University employee. I shall protect the privacy and confidentiality of student, employee, and financial information to which I have access and shall use it solely for the performance of my official duties. I agree not to access student, employee, or financial information unless such access is required for the performance of my official duties. FURTHERMORE: I agree that I will be a responsible user of data. Data I obtain from this system will be stored under secure conditions. I will make every reasonable effort to maintain privacy of the data. I will make every reasonable effort to interpret the data accurately and in a professional manner. Prior to sharing data with others, electronically or otherwise, I will ensure that the recipient is authorized and has a need to access the data and understands their responsibilities as a user. I will sign off the system when not using it or enable system to have a screen saver with password. I will not disclose my password to other individuals. I will not use another person s password. If I have reason to believe my password, or that of another individual has been compromised or is being used by a person other than the individual to whom it was issued, I will immediately report that information to the FAMU EIT Security Manager. I will safeguard all of the University confidential and sensitive information at all times, such as reports, spreadsheets and documents in accordance to the University s prescribe manner according to written security policies and procedures. I am responsible for protecting the security of the records and confidentiality of the information to which I have access. Specifically: I will not use the information I have access to in an unauthorized manner I will neither knowingly include nor cause to be included a false or misleading entry in any record. I will not change or delete any entry in any record unless it is done in accordance with University policies and procedures. I will not copy, reproduce, electronically print, or forward any record, except in the performance of my defined duties and in accordance with University policies and procedures. I will not divulge, in any way, knowledge of any confidential information that I have learned. I will dispose of confidential reports in an appropriate manner when done with them. Note: At the end of the consultant/vendor contract, access and password will expire by date, unless other wise agreed. My signature indicates that I have read, understand, and agree to abide by the terms and conditions of this agreement. Consultant/Vendor Name (Please Print) Consultant/Vendor Name Signature Date Company (Please Print) 27

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

SPRING-FORD AREA SCHOOL DISTRICT

SPRING-FORD AREA SCHOOL DISTRICT No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In

More information

IT ACCEPTABLE USE POLICY

IT ACCEPTABLE USE POLICY CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Information Security for Mail Processing/Mail Handling Equipment

Information Security for Mail Processing/Mail Handling Equipment Information Security for Mail Processing/Mail Handling Equipment Handbook AS-805-G March 2004 Transmittal Letter Explanation Increasing security across all forms of technology is an integral part of the

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security HISPOL 003.0 The United States House of Representatives Internet/ Intranet Security Policy CATEGORY: Telecommunications Security ISSUE DATE: February 4, 1998 REVISION DATE: August 23, 2000 The United States

More information

Southern Adventist University Information Security Policy. Version 1 Revised Apr

Southern Adventist University Information Security Policy. Version 1 Revised Apr Southern Adventist University Information Security Policy Version 1 Revised Apr 27 2015 Summary The purpose of this policy statement is to establish the requirements necessary to prevent or minimize accidental

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

13. Acceptable Use Policy

13. Acceptable Use Policy 13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes Effective Date: 01/01/2014 Page 1 of 7 REVISION HISTORY Revision No. Revision Date Authors Description of Changes 1.0 11/04/2013 CISO Populate Into Standard Template APPROVED BY This Policy is established

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

DETAILED POLICY STATEMENT

DETAILED POLICY STATEMENT Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

Information Technology Cyber Security Policy. Convergint Technologies, LLC

Information Technology Cyber Security Policy. Convergint Technologies, LLC Information Technology Cyber Security Policy Convergint Technologies, LLC September 2015 Convergint Technologies, LLC POLICY MANUAL Subject: CYBER SECURITY POLICY Approved: Tom Schmitt Effective Date:

More information

B. To ensure compliance with federal and state laws, rules, and regulations, including, but not limited to:

B. To ensure compliance with federal and state laws, rules, and regulations, including, but not limited to: Executive Policy, EP 2.215 Institutional Data Governance Page 1 of 14 Executive Policy Chapter 2, Administration Executive Policy EP 2.215, Institutional Data Governance Effective Date: xxxx 2017 Prior

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

The University of Tennessee. Information Technology Policy (ITP) Preamble

The University of Tennessee. Information Technology Policy (ITP) Preamble Preamble The policy for Use of Information Technology Resources at the University of Tennessee (UT) (Section 135, Part 01, of UT s Fiscal Policy Manual) regulates use of the University's information technology

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Privacy Policy on the Responsibilities of Third Party Service Providers

Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information