University of Northern Iowa Administration and Finance

advertisement
University of Northern Iowa
Administration and Finance
Windows Remote Desktop Services Activation Application
Date:
Name:
Department:
Telephone:
Location of Off-Site Computer:
Primary Off-Site Internet Service
Provider (i.e., CFU, Mediacom, etc.):
Name of UNI Computer to be accessed:
1. Is the off-site computer a University owned/managed device (circle one)?
YES
NO
2. Describe how remote access will be used:
3. Will information protected by law (i.e., social security numbers, driver’s licenses, credit card numbers, bank account
numbers, etc.) be accessed from the remote location? If so, please describe:
4. My off-site computer has the following security software and configurations installed, active, and current:
Check if
Present
Security Feature
Product Name
(Please enter below)
Example: Symantec Antivirus v10
Anti-Virus Protection (with autoprotect enabled)
Automatic install of security updates
n/a
Windows Firewall is active
n/a
5. My offsite computer is running Windows 7, 8, or 10. If your offsite computer is a Mac, it is running OS 10.9, 10.10, or
10.11 (circle one). YES NO
Signatures and Approvals:
I have read the attached policies and guidelines regarding workstation requirements and understand my responsibilities with
regard to proper handling of University data. Additionally, I verify that the off-site computer being used by me to remotely
connect to a University computer has the minimum security specifications listed above.
Applicant Signature:
Date:
Signature of Supervisor:
Date:
Signature of Departmental Director:
Date:
For processing, mail completed form to:
Director, AF Technology Services
West Gym 206-0192
Last Updated November 2015
INFORMATION TECHNOLOGY SERVICES
ELECTRONIC INFORMATION AND NETWORK SECURITY POLICY
Purpose
This policy serves to create an environment that mitigates threats to the electronic information resources of the University of
Northern Iowa (UNI) by improving the university’s ability to prevent, deter, detect, respond to, and recover from internal and
external compromises to its electronic information resources. These threats could violate the law as well as negatively affect
business operations, data integrity, privacy, productivity, reputation, and property rights of not only UNI but also those with
whom UNI interacts electronically.
Policy Statement
Electronic information and the UNI network are critical to the University’s business operations. In order to maintain the
stability and accessibility required for those operations and to protect university information including that obtained from
employees, students, and guests (some of which is protected by law), the university must reasonably secure its electronic
information resources. Each member of the campus community, depending on his or her responsibilities, shall play a role in
mitigating the security risks associated with his or her use of electronic information and the UNI network. Information
Technology Services (ITS) shall define the roles and responsibilities associated with this policy with the approval of the
Policy and Planning Committee for Information Technology (PPCIT).
Definitions
PROTECTED BY LAW All information assets for which there are legal requirements for preventing disclosure or financial
penalties for disclosure. Data covered by Federal and State legislation, such as FERPA, HIPPA, Gramm-Leach-Bliley Data
Protection Act, and Privacy Act are in this class.
CONFIDENTIAL Information about current and former students, staff, and faculty that, although not protected by law,
would cause severe damage to the University if disclosed or modified. Data considered Confidential includes information
about: research subjects, clients, patrons, and donors; certain business operations, finances, legal and other operational
matters of a sensitive matter; current, former, and prospective employees’ information such as employment status, pay,
benefits data, and other personnel information; information security data such as authentication, authorization, and usage
records and information about security-related incidents.
INTERNAL USE ONLY Information that requires protection but the sensitivity is less than with Confidential Data. This
data could include internal memos, emails, and other documents where distribution is limited by the author.
PUBLIC Information that can be disclosed freely to any person inside or outside the University.
Procedures
ITS shall use the following principles in developing roles and responsibilities:
All Data Protected by Law and all Confidential Data must be identified and assigned a Data Custodian
Unless otherwise identified, information shall be assumed to be of Internal Use Only.
Access to Data Protected by Law or identified as Confidential shall be granted on a Need-To-Know basis by the Data
Custodian.
Users are expected to maintain confidentiality of University Internal-Use and Confidential data regardless of security
measures that have been employed.
Users shall be provided training by Data Custodian on expectations, knowledge, and skills related to information security.
Users electing to store Internal-Use data on local media (CD, local hard disk, PDA, etc.) shall be responsible for ensuring
that its security, confidentiality and integrity are maintained per this policy.
Data Protected by Law shall not be stored outside the University central administrative systems and should only be used for
reports and data extracts as required by law.
Data identified as Confidential shall not be stored outside the University central administrative systems without prior
approval of data custodians and a server location certified by ITS as acceptable for storage. Such data shall never be stored
on local workstations or laptops and may be used for reports and data extracts only as approved.
Specific roles and responsibilities for all users of UNI data shall be defined, published and updated in the Electronic
Information and Network Security Roles and Responsibilities document.
Enforcement
Violations of this policy shall be handled consistent with University disciplinary procedures applicable to the relevant person.
Consistent with Acceptable Use and Network Policies, the University may temporarily suspend, block or restrict access to
information or resources when it appears this action is necessary to protect the integrity, security, or functionality of
University resources or to protect the University from Liability.
INFORMATION TECHNOLOGY SERVICES
ELECTRONIC INFORMATION AND NETWORK SECURITY ROLES AND RESPONSIBILITIES
1. Faculty, Staff, and students with access only to their own information that is classified as Protected By Law,
Confidential or Internal Use Only shall:
Maintain familiarity with and adherence to University Policies.
Create and secure strong passwords that meet recommended standards (even if these standards are unenforceable). Do not
share your password with others or write them down and store in places that are accessible to others. Passwords should be
at least 8 or more characters and composed of uppercase and lowercase letters, numbers and punctuation characters when
supported.
Secure desktop, laptop, and PDAs both physically and via network access. Be sure that Operating System and critical
applications are patched and up to date. Your Information Service Provider may have an automated way of doing this. Be
sure that generic accounts and passwords that come from vendor and software vendors are disabled. Use a physical security
device if you are using mobile technology in public locations.
Configure Remote Access to your workstations, if used, to prevent unauthorized access. Restrict remote access to central
authentication methodologies that support account lockout. Consult with your Information Service Provider before enabling
any Remote Access to your workstation.
Logoff of an application and locking your workstation upon inactivity.
Ensure that Anti-Virus and malicious code protection is installed on your system and set to receive automatic updates from
university or vendor servers. Software should be configured to provide active protection and scheduled to search for
vulnerabilities on a daily basis. Users need to remember that many viruses and much malicious code is distributed via email
and from web downloads. Users should not open attachments, run executables, macros or scripts or download files from the
Internet if they don’t know the source and integrity of the file.
2. Faculty, Staff, and students who have access to personal information other than their own that is classified as
Protected By Law, Confidential or Internal Use Only shall:
Meet all requirements from 1 above.
Not download or store data that is Protected By Law on local hard drives or local servers.
Ensure that distribution and transmission of Confidential and Internal-Use only information must not be made to persons
who are not authorized to access the information. This applies to all copies of the information. Confidential information that
is transported physically or electronically must be protected from unauthorized access. For electronic transmission
appropriate encryption is required if that information is sent over public networks. Confidential Information should not be
sent via E-mail. Information Service Providers are responsible for determining and implementing appropriate encryption for
data transmitted from central services.
Ensure that the destruction and disposal of information is done in such a manner to ensure it cannot be retrieved or
recovered. For Protected By Law and Confidential paper documents shredders are highly recommended. For electronic
documents be sure to use software that wipes and rewrites electronic media containing Protected By Law and Confidential
electronic data.
3. Faculty, Staff, and students who store Confidential information on local hard drives or servers shall:
Meet all requirements from 1 and 2 above.
Obtain permission from Data Custodian and ITS Information Systems identifying data elements and storage location.
Store information, whether computerized or on other media, in a place that provides a level of protection commensurate
with the classification of the data and risk faced by the university should compromise occur. Confidential data must be
encrypted if stored on local computers and must not be taken off campus unless you can ensure appropriate protection.
4. Faculty and staff who manage servers containing Internal Use Only or Public data shall:
Meet all requirements from 1, 2 and 3 above
Implement specific information security policies surrounding access to information stored on their systems via information
technology
Assure integrity for data and information technology, systems and network
Take steps to actively protect and monitor systems. This includes up-to-date patch management, intrusion detection
software, anti-virus software and active logging of activity, on-campus and off-campus access for users and administrators.
Assure that information technology authentication and authorization systems are appropriate and consistent with university
standards and managed responsibly.
Develop disaster recovery, backup and record retention plans
Report incidences of known compromises Provide physical security commensurate with the value of the data and risk faced
by the university should compromise occur.
5. Faculty and staff who manage servers that contain Protected By Law or Confidential information include domain
controllers and other authentication systems:
All requirements from 1, 2, 3 and 4 above
Obtain permission from Data Custodian and ITS Information Systems identifying data elements and storage location.
Acquire and operate software designated by the university as necessary for protecting Protected By Law or Confidential
data.
6. Data Custodians who are assigned primary responsibility for particular information shall:
Establish security policy and procedures regarding specific data
Assign classification to their information and mark appropriately
Determine authorization for access
Keep records of authorization
Report security incidences of known compromises
Offer appropriate training for university users of this information. Determine who should receive, content of training,
arrange for training opportunities.
7. Information Security Staff:
Stay current on evolving security threats, security standards, evolving State and Federal laws and guidelines regarding
information security
Establish campus standards for securing University information
Work with Information Service Providers to implement standards
Investigate and report on Security Incidences
Download