Information Security Plan

Information Security Plan

Information Security Plan In compliance with the Gramm Leach Bliley Act of 1999 Table of Contents Information Security Plan ........................................................................................................ 3 Identification and Assessment of Risks to Customer Information ............................................ 3 Data Classification ................................................................................................................... 4 Information Security Plan Coordinators ................................................................................... 5 Design and Implementation of Safeguards Program ................................................................ 6 Employee Management and Training ............................................................................................... 6 Physical Security .............................................................................................................................. 6 Information Systems ........................................................................................................................ 6 Management of System Failures and Compromises ......................................................................... 7 Selection of Appropriate Service Providers .............................................................................. 7 Information Technology Services Unit General Security Considerations .................................. 8 Computer Labs ................................................................................................................................. 8 Anti-Virus ........................................................................................................................................ 8 Network Control and Access ............................................................................................................ 8 DHCP Guidelines ................................................................................................................................... 9 DNS Guidelines ................................................................................................................................... 10 Security Assessment ....................................................................................................................... 10 End-User Devices (Workstations, Laptops, Tablets, Mobile Devices, etc.) ........................................ 10 Software Licenses ........................................................................................................................... 11 Physical Access ............................................................................................................................... 11 Servers ............................................................................................................................................ 12 Passwords ....................................................................................................................................... 13 Physical Assets ................................................................................................................................ 13 Wireless Access ............................................................................................................................... 13 1 Destruction and Disposal of Information and Devices ..................................................................... 14 Employee Training and Management .............................................................................................. 14 Sensitive Data Protection ................................................................................................................ 14 Release of WKU Data to Third Parties ............................................................................................. 16 Privacy Statement ................................................................................................................. 16 Family Educational Rights and Privacy Act (FERPA) ................................................................ 17 Notification of Rights ...................................................................................................................... 17 Incident Reporting ................................................................................................................ 19 Incident Response ................................................................................................................. 19 University Individual Department Procedures ....................................................................... 21 ID Center ........................................................................................................................................ 21 Department of Student Financial Assistance ................................................................................... 21 Office of the Bursar ......................................................................................................................... 21 Office of Admissions ....................................................................................................................... 22 Department of Housing and Residence Life ..................................................................................... 23 Office of the Registrar ..................................................................................................................... 25 Violations .............................................................................................................................. 26 Continuing Evaluation and Adjustment ................................................................................. 26 Revision History .................................................................................................................... 27 2 Information Security Plan This Information Security Plan describes Western Kentucky University's safeguards to protect data, information, and resources as required under the Gramm Leach Bliley Act. These safeguards are provided to: • Make reasonable efforts to ensure the security and confidentiality of covered data, information, and resources; • protect against anticipated threats or hazards to the security or integrity of such information; and • protect against unauthorized access to or use of covered data, information, and resources that could result in substantial harm or inconvenience to any customer. This Information Security Plan also provides for mechanisms to: • Identify and assess the risks that may threaten covered data, information, and resources maintained by the University; • manage and control these risks; • implement and review the plan; and • adjust the plan to reflect changes in technology, the sensitivity of covered data, information and resources, and internal or external threats to information security. Identification and Assessment of Risks to Customer Information The University recognizes that it has both internal and external risks. These risks include, but are not limited to: • Unauthorized access of covered data, information, and resources by someone other than the owner of the covered data, information, and resources; • compromised system security as a result of system access by an unauthorized person; • interception of data during transmission; • loss of data integrity; • physical loss of data in a disaster; • errors introduced into the system; • corruption of data or systems; • unauthorized access or distribution of covered data, information, and resources by employees, students, affiliates, or other constituencies; • unauthorized requests for covered data, information, and resources; • unauthorized access through hardcopy files or reports; and • unauthorized transfer of covered data, information, and resources through third parties. The University recognizes that this may not be a complete list of the risks associated with the protection of covered data, information, and resources. Since technology is not static, new risks are created 3 regularly. Accordingly, ITS staff will monitor industry sources and advisory groups such as the Educause Security Institute, the Internet2 Security Working Group, and SANS for identification of new risks. The University believes current safeguards are reasonable and, in light of current risk assessments, are in line with common practices to provide security and confidentiality to covered data, information, and resources maintained by the University. Additionally, these safeguards protect against currently anticipated threats or hazards to the integrity of such information. However, the University cannot guarantee the unequivocal security of covered data, information, and resources given the evolving and ever-changing state of IT environments and threats thereto. Data Classification There are varying levels or classifications of data stored at and by WKU. Table 1 below describes these classes. Table 1: Classes of Data at WKU Class Description Examples Confidential University-related information is classified as • Documentation for the Board of CONFIDENTIAL if access by unauthorized parties Regents, Administrative Council or could cause the entity to incur substantial University other Executive Board at WKU losses. • Non-published accounting material • Budgets and strategy memoranda This includes, in particular: • Information about major 1. Detailed information that can affect the transactions, University WKU brand and that is not general

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    27 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us