Information Technologies

Information Security Policy

Section: Information Technology Policies
Policy Name: Information Security Policy
Policy Owner: Executive Vice President
Responsible University Office: Information Technologies
Origination Date: July 1993
Revisions: October 6, 2005
Legacy Policy Number: 1-15
  1. PURPOSEThe University’s information is one of its vital assets. The purpose of the Information Security Policy is to protect this asset by establishing employee responsibility for the security of the University’s information. The Personal Non-Public Information¬†Legacy Policy 1-22 expands on the Information Security Policy by establishing requirements for protecting personal, non-public information and notifying individuals whose high risk personal information may have been disclosed by a security breach. This policy applies to all University full-time, part-time and miscellaneous wages employees.
  2. GENERAL POLICY STATEMENTIt is the policy of the University to protect its information assets and allow the use, access and disclosure of such information only in accordance with University interests and applicable laws and regulations. All University employees providing services or working with the University’s information are responsible for protecting it from unauthorized access, modification, destruction or disclosure.

    “The University’s information” is defined as any information within its purview, including information which it may not own but which is governed by laws and regulations to which the University is held accountable. It includes all student record data, all personnel data, all University financial data, all student life data, all departmental administrative data, all alumni and donor data, and all other data that pertains to, or supports the administration of the University. This data may be facts, records, reports, planning assumptions or any information meant only for internal use.

    This policy encompasses the safekeeping of the University’s information in whatever physical form, such as printed, audio, video and electronic.

  3. IMPLEMENTATIONUnit administrators shall develop and administer information security programs that appropriately classify and protect information under their control. The protection of the University’s information must be part of the overall business plan.

    Unit administrators are responsible for:

    1. establishing access and utilization criteria
    2. defining the criteria for archiving the information to satisfy retention requirements
    3. determining the value of proprietary information to the functioning of the University and defining reasonable requirements for protecting the asset
    4. developing a workable plan for resuming operations in the event a disaster destroys the information
    5. specifying information control and protection requirements to be adhered to by employees processing and using the information.
    6. monitoring compliance and enforcing the policy.

      However, since information security measures must cover the entire flow of information in the University, the implementation of the information security policy cannot be delegated to only unit administrators. As custodians of the University’s information, all employees must adhere to established procedures to ensure that they use the University’s information only as required by the normal functions of their duties and that they safeguard it properly according to its sensitivity, proprietary and/or critical nature.

  4. VIOLATIONS OF THIS POLICYEmployees who violate this policy may be subject to disciplinary action in accordance with University due process.

Related Links: Personal Non-Public Information (PNPI) Policy