policies:information_resources_use_and_security_policy
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policies:information_resources_use_and_security_policy [2016/07/14 18:34] – created peter | policies:information_resources_use_and_security_policy [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
===== Purpose ===== | ===== Purpose ===== | ||
- | The **Information Resources Use and Security | + | The purpose of this Policy |
- | This Policy provides requirements and guidelines to establish | + | * establish |
- | This Policy serves | + | * protect the privacy of individuals by preserving the confidentiality of Personally Identifiable Information entrusted to the System; |
+ | |||
+ | * ensure compliance with applicable Policies and local and country laws and regulations regarding management of risks to and the security of Information Resources; | ||
+ | |||
+ | * establish accountability; | ||
+ | |||
+ | * educate individuals regarding their responsibilities associated with use and management of System Information Resources; and | ||
+ | |||
+ | * serve as the foundation for each Institution’s Information Security Program, providing | ||
+ | |||
+ | |||
+ | ===== Policy Statement ===== | ||
+ | |||
+ | Information Resources residing in the System are strategic and vital assets. | ||
+ | |||
+ | |||
+ | ===== Applicability ===== | ||
+ | |||
+ | This Policy applies to: | ||
+ | |||
+ | * all Institutions and organizational units within the System; | ||
+ | |||
+ | * all Information Resources owned, leased, operated, or under the custodial care of any System Institution, | ||
+ | |||
+ | * all Information Resources owned, leased, operated, or under the custodial care of third-parties operated on behalf of a System Institution, | ||
+ | |||
+ | * all individuals accessing, using, holding, or managing Information Resources on behalf of The System. | ||
+ | |||
+ | |||
+ | ===== Compliance with Law ===== | ||
+ | |||
+ | Information that is collected pursuant or related to the System Information Security Program is confidential by law. Accordingly, | ||
+ | |||
+ | |||
+ | ===== Information Security Standards ===== | ||
+ | |||
+ | System Institutions shall implement and abide by the following Standards: | ||
+ | |||
+ | |||
+ | |||
+ | ===== Definitions ===== | ||
+ | |||
+ | The following definitions are used within the context of this Policy and all System Standards established by this Policy. | ||
+ | |||
+ | **Authentication** - a process used to verify one’s identity. | ||
+ | |||
+ | **Backup** - copy of files or applications made to avoid loss of data and facilitate recovery in the event of a system failure or other data loss event. | ||
+ | |||
+ | **Centralized IT** - the institutional information technology services and support organization, reporting to the highest-ranking information technology administrator/ | ||
+ | |||
+ | **Change** - any addition or removal of, and any modification or update to an Information Resource. | ||
+ | |||
+ | Change Management - process of controlling the communication, | ||
+ | |||
+ | **Chief Administrative Officer** - the highest ranking executive officer at each Institution. | ||
+ | |||
+ | **Cloud Computing (Cloud Services)** - is a service that provides | ||
+ | |||
+ | **Common Use Infrastructure** - an IT facility, network, system, or other Information | ||
+ | |||
+ | **Computing Device** - any device capable of sending, receiving, or storing Digital Data, including but not limited | ||
+ | |||
+ | **Confidential Data** - data that is exempt from disclosure under law are designated with the classification of “Confidential” within the System Data Classification Standard. | ||
+ | |||
+ | **Controlled Data** - one of three data classifications defined within the System Data Classification Standard. The “Controlled” classification applies to information/data that is not generally created for or made available for public consumption, | ||
+ | |||
+ | **Data** - elemental units, regardless of form or media, that are combined to create information used to support research, teaching, patient care, and other System business processes. Data may include but are not limited to: written, electronic video, and audio records, photographs, | ||
+ | |||
+ | **Data Centre** - a facility used to house computer systems and associated components, such as telecommunications and storage systems. | ||
+ | |||
+ | **Decentralized IT** - information technology service and support organizations reporting to the heads of business units, departments, | ||
+ | |||
+ | **Digital Data** - the subset of Data (as defined above) that is transmitted by, maintained, or made available in electronic media. | ||
+ | |||
+ | **Emergency Change** - a change to an Information Resource made in response to unexpected events or circumstances that pose a threat to the environment or institution and thereby justify use of expedited change | ||
+ | |||
+ | **Electronic Communication** - method used to convey | ||
+ | |||
+ | **Electronic Mail (Email)** - any message, image, form, attachment, data, or other communication sent, received, or stored within an electronic mail system. | ||
+ | |||
+ | **Electronic Media** - any of the following: | ||
+ | |||
+ | * electronic storage media including storage devices in computers (hard drives, memory) and any removable/ | ||
+ | * transmission media used to exchange information already in electronic storage media. | ||
+ | |||
+ | **Guideline** - recommended, | ||
+ | |||
+ | **High Impact Information Resources** - Information Resources whose loss of confidentiality, | ||
+ | |||
+ | * cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions; | ||
+ | * result in major damage to organizational assets; | ||
+ | * result in major financial loss; or | ||
+ | * result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries. | ||
+ | |||
+ | **High Risk Computing Device** - a computing device meeting any of the following criteria: | ||
+ | |||
+ | * is located in a public or high-traffic area and is used by a person who has access to Confidential Data; | ||
+ | * is used to create, store, or process Confidential Data or is used within a functional area that handles such data; | ||
+ | * is used by any executive officers or their support staff; or | ||
+ | * contains data that if accessed, changed, or deleted by an unauthorized party could have highly adverse impact on the System. | ||
+ | |||
+ | Based on these criteria, designation of a computing device as being “High Risk” is made by the Information Resource Owner in consultation with the Institution’s Information Security Officer. | ||
+ | |||
+ | **Information** - Data organized, formatted and presented in a way that facilitates meaning and decision making. | ||
+ | |||
+ | **Information Resources** - any and all computer printouts, online display devices, mass storage media, and all computer-related activities involving any device capable of receiving email, browsing Web sites, or otherwise capable of receiving, storing, managing, or transmitting data including, but not limited to, mainframes, servers, Network Infrastructure, | ||
+ | |||
+ | **Information Resources Custodian (Custodian)** - an individual, department, Institution, | ||
+ | |||
+ | **Information Resources Manager (IRM)** - the executive responsible for Information Resources across the whole of the institution. | ||
+ | |||
+ | **Information Resources Owner (Owner)** - the manager or agent responsible for the business function that is supported by the Information Resource or the individual upon whom responsibility rests for carrying out the program | ||
+ | |||
+ | **Information Security Administrator** - a departmental employee, designated by management, who assists with information security tasks as described | ||
+ | |||
+ | **Information Security Program** - the Policies, Standards, Procedures, Guidelines, elements, structure, strategies, objectives, plans, metrics, reports, resources, and services adopted for the purpose of securing System Information Resources. | ||
+ | |||
+ | **Information System** - an interconnected set of Information Resources under the same direct management control that shares common functionality. | ||
+ | |||
+ | **Information Technology (IT)** - the hardware, software, services, supplies, personnel, facilities, maintenance, | ||
+ | |||
+ | **Inherent Impact** - the degree of Impact (High, Moderate, or Low) that could result if Information Resources were subjected to unauthorized access, use, disclosure, disruption, modification or destruction. | ||
+ | |||
+ | **Institution** - System Administration, | ||
+ | |||
+ | **Integrity** - the accuracy and completeness of information and assets, and the authenticity of transactions. | ||
+ | |||
+ | **Internet** - a global system interconnecting computers and public computer networks. The computers and networks are owned separately by a host of organizations, | ||
+ | |||
+ | **Lead Researcher** - the person engaged in the conduct of Research | ||
+ | |||
+ | **Local Area Network (LAN)** - a data communications network spanning a limited geographical area, a few miles at most. It provides communication between computers and peripherals at relatively high data rates and relatively low error rates. | ||
+ | |||
+ | **Low Impact Information Resources** - Information resources whose loss of confidentiality, | ||
+ | |||
+ | * cause a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced; | ||
+ | * result in minor damage to organizational assets; | ||
+ | * result in minor financial loss; or | ||
+ | * result in minor harm to individuals. | ||
+ | |||
+ | **Malware** - a computer program that is inserted into an Information System, usually covertly, with the intent of compromising the confidentiality, | ||
+ | |||
+ | **Mission Critical Information Resources** - Information Resources defined by the System Owner to be essential to System or the Institution’s ability to meet its instructional, | ||
+ | |||
+ | * Information Systems managing Confidential Data; | ||
+ | * Common Use Infrastructures; | ||
+ | * Institutional Network and Data Center Infrastructure; | ||
+ | * Identity and Access Management Systems, such as single-sign-on or other applications required to enable access to other critical system; | ||
+ | * Administrative systems (e.g., HR, Finance, Payroll, student/ | ||
+ | * Student information systems; | ||
+ | * Patient care and life-support systems, etc. | ||
+ | |||
+ | Moderate Impact Information Resources - Information Resources whose loss of confidentiality, | ||
+ | |||
+ | * cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced; | ||
+ | * result in significant damage to organizational assets; | ||
+ | * result in significant financial loss; or | ||
+ | * result in significant harm to individuals that does not involve loss of life or serious life threatening injuries. | ||
+ | |||
+ | **Network Infrastructure** - the distributed hardware and software (i.e., cabling, routers, switches, wireless access points, access methods, and protocols), information, | ||
+ | |||
+ | **Non-System Owned Computing Device** - any device that is capable of receiving, transmitting, | ||
+ | |||
+ | **Owner** – See Information Resources Owner. | ||
+ | |||
+ | **Password** - a string of characters used to verify or " | ||
+ | |||
+ | **Personally Identifiable Information (PII)** - information that alone or in conjunction with other information identifies an individual. PII includes, but is not limited to: an individual’s name; a date of birth; a government-issued identification number; a mother’s maiden name; unique biometric data (including an individual’s fingerprint, | ||
+ | |||
+ | **Policy** - high level statements of intent relating to the protection of Information Resources across an organization (e.g., the System). Compliance with a Policy is mandatory. | ||
+ | |||
+ | **Portable Computing Device** - any easily movable device capable of receiving, transmitting, | ||
+ | |||
+ | **Practice** - customary actions, which may or may not be documented, taken to accomplish information security tasks. | ||
+ | |||
+ | **Procedure** - step by step instructions to assist information security and technology staff, Custodians, and Users in implementing various policies, standards, and guidelines. | ||
+ | |||
+ | **Published Data** - one of three data classifications within the System Data Classification Standard. This includes data and information made available to the public through posting to public websites or distribution through email, social media, print publications, | ||
+ | |||
+ | **Remote Access** - access to Information Resources that originates from a Remote Location. | ||
+ | |||
+ | **Remote Location** - a location outside the physical boundary of the Institution (inclusive of leased/ | ||
+ | |||
+ | **Residual Risk** - the risk (Low, Moderate, or High) that remains after security controls have been applied. | ||
+ | |||
+ | **Research** - systematic investigation designed to develop and contribute to knowledge and may include all stages of development, | ||
+ | |||
+ | **Researcher** - Lead Researchers, | ||
+ | |||
+ | **Risk** – a function of the likelihood that a threat will exploit a vulnerability and the resulting impact to System missions, functions, image, reputation, assets, or constituencies if such an exploit were to occur. | ||
+ | |||
+ | **Scheduled Change** - a change to an Information Resource made under normal working conditions following formally defined change control processes as defined in Change Management. | ||
+ | |||
+ | **Security Incident** - an event that results in unauthorized access, loss, disclosure, modification, | ||
+ | |||
+ | **Server** - a computer program that provides services to other computer programs in the same, or another, computer. | ||
+ | |||
+ | **Social Media** - a forum or media for social interaction, | ||
+ | |||
+ | **Standards** - specific mandatory controls that are components of the Information Security Policy. | ||
+ | |||
+ | **Strong Password** - a Password constructed so that another User cannot easily guess it and so that a “hacker” program cannot break it within a reasonable amount of time. It typically consists of a minimum number of positions in length and contains a combination of alphabetic, numeric, or special characters. | ||
+ | |||
+ | **System Record** – a document, book, paper, photograph, sound recording, or other material, regardless of physical form or characteristic, | ||
+ | |||
+ | **Two-factor Authentication** - a process for verifying a person’s identity that requires use of two of the following three elements: | ||
+ | |||
+ | * something the person knows, such as a password; | ||
+ | |||
+ | * something the person has, such as a token or smart card; or | ||
+ | |||
+ | * a unique characteristic of the person, such as a fingerprint. | ||
+ | |||
+ | System Administration, | ||
+ | |||
+ | **System Administration** - the central administrative offices that provide oversight and coordination of the activities of the System and its Institutions. | ||
+ | |||
+ | **System Data (Data)** - All Data or Information held on behalf of the System and its Institutions created as a result of and/or in support of the System business, or residing on System Information Resources, including paper records. | ||
+ | |||
+ | **System Shared Data Centre** - any data centre governed by the Shared Data Centre group on behalf of the System. | ||
+ | |||
+ | **System-wide Information Security Program** – the System policies, standards, procedures, elements, structure, strategies, objectives, plans, metrics, reports, resources, and services that establish requirements and provide for oversight and supplemental support for Institutional Information Security Programs. | ||
+ | |||
+ | **User** - an individual, automated application, | ||
+ | |||
+ | **Vendor** - any third-party that contracts with the System or an Institution to provide goods and/or services to the System or the Institution. | ||
policies/information_resources_use_and_security_policy.1468521248.txt.gz · Last modified: 2020/07/15 09:30 (external edit)