Policy: University Information Technology Security Program
|Date: 06/09/06||Policy ID: IRM-011||Status: Final|
|Contact Office:||Chief Information Officer (Office of the)|
|Oversight Executive:||Chief Information Officer|
|Applies To:||University Academic Division, Medical Center, and College at Wise.|
|Table of Contents:||Policy Statement|
|Reason for Policy:||The University has a highly complex and resource-rich information technology environment upon which there is increasing reliance to provide mission-critical academic, instructional and administrative functions. Safeguarding the institution’s computing assets in the face of growing security threats is a significant challenge requiring a strong, persistent and coordinated program that leverages widely accepted, effective security practices appropriate for the higher education environment. This policy states the codes of practice with which the University aligns its information technology security program.|
|Definition of Terms in Statement:|
The University’s information technology security program is based upon best practices recommended in the “Code of Practice for Information Security Management” published by the International Organization for Standardization and the International Electrotechnical Commission (ISO/IEC 27002), appropriately tailored to the specific circumstances of the University. The program also incorporates security requirements of applicable regulations, such as the Family Educational Rights and Privacy Act, Gramm-Leach-Bliley Act and Health Insurance Portability and Accountability Act. Professional organizations, such as the national EDUCAUSE Association and the Virginia Alliance for Secure Computing and Networking, serve as resources for additional effective security practices.
The ISO/IEC 27002 Code of Practice and other sources noted above are used to guide development and ongoing enhancement of additional information technology security policies as needed. All policies governing information technology security can be found in the University’s policy directory and at:
“Code of Practice for Information Security Management” (ISO/IEC 27002) – This international standard defines guidelines and general principles for the effective management of information security within an organization. It is a risk-based framework widely used to guide establishment of security standards and management practices.
EDUCAUSE Association – EDUCAUSE is a nonprofit association dedicated to the advancement of higher education through the effective use of information technology. Members include representatives from institutions of higher education, higher education technology companies, and other related organizations.
International Organization for Standards (ISO) – The world’s largest developer of standards, the organization is made up of representatives from governmental and private sector standard bodies, e.g. the American National Standards Institute.
International Electrotechnical Commission (IEC) – The IEC is a global organization that develops and published standards addressing electrical, electronic and related technologies. Membership comes from government, the private sector, consumer groups, professional associations, and others.
Virginia Alliance for Secure Computing and Networking (VA SCAN) – VA SCAN was formed to help strengthen information technology security programs within Virginia. The Alliance was organized and is operated by security practitioners and researchers from several Virginia higher education institutions, including the University of Virginia.
The Commonwealth of Virginia Restructured Higher Education Financial and Administrative Operations Act of 2005 grants institutions additional authority over financial and administrative operations, on condition that certain commitments to the Commonwealth are met. The University of Virginia’s Management Agreement with the Commonwealth provides full delegated responsibility for management of the institution’s information technology security activities. This delegation includes the authority to conduct these activities in accordance with industry best practices appropriately tailored for the specific circumstances of the University, in lieu of following Commonwealth-determined specifications. This policy documents the industry best practices with which the University will align its security activities.
|Major Category:||Information Resource Management|
|Category Cross Reference:|
|Next Scheduled Review:||06/09/15|
|Approved By, Date:||Board of Visitors, 06/09/06|
|Revision History:||Updated 1/15/10, 11/4/08. This is the first version of the policy.|
|Supersedes (previous policy):|