OFFICE OF INFORMATION SECURITY University of Texas Medical Branch at Galveston Information Security Officer PRACTICE STANDARD: Family 2.0 Awareness & Training 2.1 Information Security Education & Awareness Program Created Date: Sept. 03, 2002 Review Date: April 19, 2013 Revise Date: April 19, 2013 Introduction UTMB cannot protect the confidentiality, integrity, and availability of information in today’s highly networked systems environment without ensuring that all people involved in using and managing IT: 1. Understand their roles and responsibilities related to UTMB’s mission. 2. Understand UTMB’s information resource security policies, practice standards and procedures. 3. Have adequate knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which they are responsible. It is generally understood by the IT security professional community that people are strongest and weakest links when it comes to securing systems and networks. The “people factor” - not technology - is key to providing an adequate and appropriate level of security. If people are the key, but are also a weak link, more and better attention must be paid to this “asset.” Security training and awareness program is paramount to ensuring that people understand their IT security responsibilities, policies and practice standards. Purpose The purpose of this practice standard is to set policy for UTMB’s Information Security Training and awareness program. It is also intended define responsibilities for all personnel who is involved in the information security program. Audience The practice standard applies to all personnel who has access to any UTMB owned or managed information resource. Confidential Digital Data Management Confidential digital data includes social security numbers, protected health information, confidential research data, digital data associated with an individual and/or digital data protected by law. Confidential digital data must be secured and protected while at rest on mobile computing/storage devices, i.e. portable hard drives, flash drives, removable media, laptops, smart phone, etc. and while in transit via email, the Internet or non-trusted networks. Privacy Electronic files created, sent, received, or stored on IR owned, leased, administered, or otherwise under the custody and control of UTMB are not private and may be accessed by appropriate personnel in accordance with the provisions and safeguards provided in the Texas Administrative Code 1 TAC §§202 (Information Security Standards), the Texas Public Information Act and in the University of Texas System UTS 165 – Information Resources Use and Security Policy. OFFICE OF INFORMATION SECURITY University of Texas Medical Branch at Galveston Information Security Officer PRACTICE STANDARD 2.1 Information Security Education & Awareness Program, continued Practice Standards A. Training and Awareness Responsibilities - The Information Security Officer (ISO), working with the Department of Occupational Training and Development will develop, publish, maintain and manage a comprehensive information security training and awareness program that will adequately educate Information Security Administrator’s and end-users on how to properly protect the information that is entrusted to them. B. End-user Training - Initial security training will be delivered at New Hire Orientation and will consist of an overview of the following topics: 1) 2) 3) 4) 5) 6) 7) 8) acceptable use data classifications privacy statement key roles and responsibilities statutory authority how you can help failure to comply (individually) failure to comply (institutionally) C. Mandatory annual end-user training will be delivered utilizing UTMB’s on-line compliance training system. The course will consist of the following topics: 1) 2) 3) 4) 5) 6) 7) 8) acceptable use data classifications privacy statement key roles and responsibilities statutory authority how you can help failure to comply (individually) failure to comply (institutionally) D. Information Security Administrators and Program Developer Training - Information security administrators, security analysts and program developers are required to obtain 8 hours of Continuing Professional Education (CPE) credits with an emphasis on information Security per year. CPE Credits can be obtained by the following: 1) Attend security related user groups a) ISA quarterly meetings b) Infragard monthly meetings c) UTInfoSec bi-annual conferences 2) Attend formal training with an emphasis on security a) Professional development classes b) UTMB sponsored security training 3) Provide Security related presentations/training to the ISA Council OFFICE OF INFORMATION SECURITY University of Texas Medical Branch at Galveston Information Security Officer PRACTICE STANDARD 2.1 Information Security Education & Awareness Program, continued E. OIS will develop, an information security awareness program aimed at reminding UTMB personnel the importance of information security and provide tips on how to be compliant with published standards and policies. OIS will, at a minimum: 1) Publish security awareness articles in the UTMB newsletter, Impact Newsletter, at least quarterly. 2) Develop, publish and maintain an information security website with user awareness tips and other pertinent security related materials. 3) Work with department chairs and directors to construct information security related emails that will be sent by the department to their respective staff. 4) On an annual basis, present security related material at IS sponsored technology forums. 5) Work with the Office of University Advancement; and during the month of October (National Information Security Awareness Month), to produce security awareness literature and posters to be displayed in high traffic areas and on electronic billboards, i.e., TV’s, plasma screens, etc. Disciplinary Actions Violations of this policy may result in disciplinary action which may include termination for employees; a termination of employment relations in the case of contractors or consultants; or suspension or expulsion in the case of a student. Additionally, individuals are subject to loss of UTMB IR access privileges, civil and/or criminal prosecution. References Texas Administrative Code, Chapter 202.75 Information Security Standards UT System Policy, UTS-165 Information Resources Use and Security Policy Payment Card Industry – Data Security Standard 2.0 NIST 800-53 Security and Privacy Controls for Federal Information Systems and Organizations Approvals and Revision History A) Approval – Information Security Officer B) Revision History Apr. 19, 2013 Applied new practice standard format Removed “Implications” section OFFICE OF INFORMATION SECURITY University of Texas Medical Branch at Galveston Information Security Officer PRACTICE STANDARD 2.1 Information Security Education & Awareness Program, continued 16