Electronic Storage of Highly Sensitive Data Policy

advertisement
Page 1 of 3
* - indicates a required field.
Electronic Storage of Highly Sensitive Data Policy
* POLICY NAME:
* POLICY TYPE:
Presidential Policy - University Administrative Policy
POLICY #:
E.4.4.
*STATUS:
Active
*CONTACT
OFFICE:
Information Technologies
*OVERSIGHT
EXECUTIVE:
Executive Vice President
*APPLIES TO:
All Faculty and Staff
*PURPOSE:
DEFINITIONS:
*POLICY
STATEMENT:
The purpose of this policy is to define controls to prevent unauthorized
disclosure of highly sensitive data when such data are stored on electronic
devices or media that are easily misplaced or stolen.
The following data is classified as Highly Sensitive Data: Personally identifiable
information including: SSNs, Passport Numbers, Driver’s License Numbers,
financial account numbers (credit card numbers, debit card numbers, banking
account numbers), and full name in conjunction with corresponding full date of
birth.
The University prohibits the storage of highly sensitive data (as defined in the
Data Classification Standard) on any non-network storage device or media.
Prohibited storage media includes storage on desktop computers, laptop
computers, PDAs, cell phones, USB drives, thumb drives, memory cards, CDs,
DVDs, local external hard drives, and other USB devices.
Exceptions to this policy, per a documented business requirement, may be
authorized only by the agency head. In cases where an agency head exception
has been granted in writing, the individual receiving the exception must contact
the Information Technologies Director of Information Security (ISO) for UMW
approved encryption technologies.
NOTE: Designated systems/applications that have been classified by IT as
‘highly sensitive’ are the only appropriate network storage locations with the
additional security requirements and safeguards to ensure protection of highly
sensitive data. For questions or guidance regarding appropriate network
storage locations of highly sensitive data, please contact the Director of
Information Security & ISO by emailing rusler@umw.edu or calling
540.654.2152.
PROCEDURES:
* General
Procedures for
Implementation:
It is the responsibility of individuals to determine if they have highly sensitive
data on any non-network storage device or media, including all desktop
computers, laptop computers, PDAs, cell phones, USB drives, thumb drives,
memory cards, CDs, DVDs, local external hard drives, or other USB devices.
Page 2 of 3
If highly sensitive data are found, you must immediately do one of the
following:
Delete any highly sensitive data from the computer/device;
Contact the ISO for assistance to move the file to a secure, centrally
managed server; or
Obtain agency approval for an exception to policy, allowing you to store
highly sensitive data on your computer/device. Both while waiting for
approval and after receiving approval, the highly sensitive data must be
protected via encryption. Immediately contact the ISO for an approved
data encryption mechanism.
Contact the division of Information Technologies if you require assistance
locating or removing files containing highly sensitive data.
If your computer, laptop, device, or media containing highly sensitive data is
lost or stolen, you must immediately report it to the UMW Campus Police and to
the Director of Information Technology Security. The incident should also be
reported per the University’s IT Security Incident Response Plan.
* Process for
Developing,
Approving, and
Amending
Procedures:
As a result of the required annual review, the CIO or her/his designee will make
appropriate changes to the policy and present them to the University President
for approval. Additional amendments will be handled on a case by case basis at
the discretion of the CIO.
* Publication and
Communication:
The policy is on the UMW website, and security-related activities created and
managed under the authority of this policy are covered in required annual
security awareness training for all employees. Data Stewards and Data Security
Contacts and Information Technology employees complete additional annual
training.
* Monitoring,
Review, and
Reporting:
The policy will be reviewed annually by the CIO or her/his designee. The policy
is part of the Information Security Program and as such is audited annually by
the Auditor of Public Accounts (APA). The ISO will follow up with Data
Stewards and Data Security contacts to ensure policy awareness and
compliance.
RELATED
INFORMATION:
Policy
Background:
* Policy Category:
Information Technology
Category Cross
Reference:
HISTORY:
* Origination Date:
November 10, 2010
Page 3 of 3
* Approved by:
President Richard V. Hurley
* Approval Date:
November 10, 2010
* Effective Date:
November 10, 2010
* Review Process:
The effectiveness of this policy will be reviewed on an annual basis upon
conclusion of the Information Security Program audit. The review will be
conducted by the CIO or her/his designee.
* Next Scheduled
Review:
Spring 2012
Revision History:
Revised: May, 2011, to clarify definition of appropriate network storage locations
Revised: August 9, 2011, to include policy review procedures
Download