P6hx23-6.9012 PROCEDURE: INFORMATION TECHNOLOGY (IT) SECURITY AUDITING and MONITORING

P6hx23-6.9012 PROCEDURE: INFORMATION TECHNOLOGY (IT) SECURITY AUDITING and MONITORING

<p> PROCEDURE</p><p>PAGE SUBJECT PROCEDURE: INFORMATION TECHNOLOGY (IT) SECURITY AUDITING AND MONITORING P6.9012-1 LEGAL 4/17/12 AUTHORITY P6Hx23-6.9012 Revision #12-4</p><p>P6Hx23-6.9012 PROCEDURE: INFORMATION TECHNOLOGY (IT) SECURITY AUDITING AND MONITORING</p><p>I. Intent</p><p>The College President, or his designee, provides the authority for members of the College’s Information Systems department to conduct IT security auditing and monitoring on any system at St. Petersburg College or connected to the St. Petersburg College network. This authority may also be extended to independent contractor agencies via approved purchase orders and/or agreements.</p><p>Such IT security audits and monitoring may be conducted to:</p><p>A. Ensure integrity, confidentiality and availability of information and resources</p><p>B. Investigate possible security incidents and ensure conformance with St. Petersburg College rules and procedures</p><p>II. Scope</p><p>This policy covers computing and communications equipment used for College business. This includes but is not limited to computers, servers, telephones, wireless and other communication devices.</p><p>III. Policy</p><p>A. When requested, and for the purpose of performing an audit, any access needed shall be provided to network security staff.</p><p>B. Certain devices will be required to facilitate ongoing monitoring and auditing. This may require special configuration settings and software.</p><p>C. The College’s director of Network Systems will initiate an independent IT security audit or assessment covering critical systems at least once every two (2) years. The results of</p><p>P6.9012-1 PROCEDURE</p><p>PAGE SUBJECT PROCEDURE: INFORMATION TECHNOLOGY (IT) SECURITY AUDITING AND MONITORING P6.9012-2 LEGAL 4/17/12 AUTHORITY P6Hx23-6.9012 Revision #12-4</p><p> these independent assessments will be shared with the person(s) responsible for the affected systems. Such person(s) responsible for the affected system shall be required to take corrective action with respect to all critical and high risk vulnerabilities or reported issues in a timely manner.</p><p>IV. Enforcement and Consequences</p><p>Noncompliant systems or devices may be disconnected from the St. Petersburg College Network and/or impounded to a secure location pending assessment of an incident by the campus provost or the vice president of Information Systems.</p><p>History: Adopted 4/17/12. Filed – 4/17/12. Effective – 4/17/12.</p><p>P6.9012-2</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us