What else do I need to know?
Definitons
Authorized Users: Any individual who has been issued a ÈÕº«ÎÞÂë NetID (or other access account) and are authorized to access specific information resources to perform business functions for the University or conduct business with the University.
Data Destruction: Any physical, chemical, or electronic process that alters magnetic, electronic, paper, CD, DVD, or other forms of data storage in a manner that renders the data permanently and irretrievably unreadable.
Communications Behavior: the actions, habits, and practices of individuals when using communication channels and technologies to transmit, receive, process, or store information. This includes behaviors such as:
- Email usage: How people send, receive, and manage emails.
- Social media interactions: How users engage with online platforms.
- Messaging apps: How individuals communicate using instant messaging services.
- File sharing: How data is transferred between devices or systems.
- Cloud storage: How information is stored and accessed remotely.
Data Stewards: Members of the University community who have the operational responsibility for discrete collections of non-public protected data (NPPD) as defined in ÈÕº«ÎÞÂë’s Privacy Policy.
Multifactor Authentication (MFA): a method of authentication that requires a user to provide two or more credentials to verify their identity, which may include a known credential (such as a password), personal details, a known device (such as a computer or mobile device), or a hardware or software token.
NetID or Network Account: The electronic identity managed by Enterprise Technology Services (ETS) that is provided for each member of the University community to access University Information Systems, including internal electronic information services..
Non-Public Protected Data (NPPD): As defined in ÈÕº«ÎÞÂë’s Privacy Policy.
Public information: Information that may be disclosed to any person inside or outside the University. Although such information may be made public, precautions may still be required to protect against unauthorized or malicious modification or destruction. Further elaboration on public information may be found in the Privacy Policy.
Technology Managers: Individuals who develop, implement, or maintain information systems or who have privileged access to information technology systems such as servers, networking equipment, and personal workstations in order to manage or support those systems, whether those systems are housed in ÈÕº«ÎÞÂë facilities or hosted externally.
University Employees: Student employees, staff, faculty, contractors, consultants, temporary employees and affiliates of ÈÕº«ÎÞÂë.
University Information: Information in any form and recorded on any media that the University or its agents use or create in the course of conducting University business, including research and teaching activities, except those materials specifically excluded from University ownership as set forth in the University’s Intellectual Property Policy.
University Information Systems: Electronic or physical University or externally-hosted systems that are used to collect, store or transmit information, including, without limitation, email, University-owned computers, communications equipment and software, University network accounts, file cabinets, storage cupboards, and internal mail or delivery systems.
User: An individual who uses University Information or University Information Systems, even if they do not have responsibility for managing institutional resources.
1. Accountability and Compliance
Members of the University community that access University Information are responsible and accountable for ensuring that they are acting in accordance with university policies and procedures that govern university data. The University may, at its discretion, enforce compliance through technical or non-technical means. Confirmed misuse of university data may result in disciplinary action. Procedures for the investigation of suspected violations, imposition of disciplinary action, and the availability of grievance or appeal claims shall be governed by otherwise applicable University policies, handbooks, and collective bargaining agreements. In certain circumstances criminal penalties may apply.
2. General Responsibilities for all University Community Members
The information security landscape is continuously evolving. As such, the University has structured procedures and system safeguards to protect University information that will also evolve over time. Even with these procedures and safeguards, members of the University community must be diligent in using university data only as authorized for the purposes of their job duties and for safeguarding university data, especially NPPD, from unauthorized distribution, interception, or access. Therefore, all members of the University community must:
- Ensure that university data only be accessed, transmitted, processed, and stored in accordance with university policies and procedures. Examples include implementing University multifactor authentication, following appropriate communications behavior when exchanging NPPD, using encryption, or ensuring physical storage requirements;
- Prohibit certain activities to divulge, copy, release, sell, loan, review, alter, or destroy University Information, except as properly authorized;
- Restrict access to physical and electronic University Information Systems that are used to contain or transmit University Information, including, without limitation, network security provisions intended to protect the University’s network(s);
- Safeguard all physical or electronic keys to University Information Systems or University Information, including, without limitation, requirements related to passwords, ID cards, computer/network account or electronic tokens;
- Report any knowledge of: (i) activities that may compromise the security of Non-public Protected Data (NPPD) or (ii) evidence of NPPD having been compromised or (iii) activities that could compromise the confidentiality, integrity, or availability of University Information Systems; and
- When notified, require users to complete annual training regarding the secure use of information technologies.
3. General Responsibilities for University Employees
University Employees have special responsibilities because of the access they have to University Information and University Information Systems. Each University Employee is expected to know and understand the security requirements of the types of University Information with which they work and to take measures to protect it in accordance with the Procedures. The Procedures detail the protection requirements for different types of information, such as, for example, locking doors and filing cabinets, protecting account passwords, protecting workstations, and securing Confidential Information that may be transmitted.
The University requires that extra precautions be taken when collecting, using, storing, transporting or destroying non-public, Non-public Protected Data (NPPD) as defined in this policy. These extra precautions are detailed in the Procedures. Every attempt should be made to limit the further circulation or use of this information except where permissible by University policy. The requirements for how this information may be shared are detailed in the Procedures.
4. General Requirement for Data Stewards
Data Stewards have additional responsibilities given their roles as it relates to NPPD in the data collections for which they are accountable. These responsibilities are detailed in the Procedures. While Data Stewards may delegate the day-to-day performance of one or more of these additional responsibilities, they remain ultimately responsible for compliance with this Policy and the Procedures and the requirements specified for the protection of the University Information contained in their Data Collection(s). In general, Data Stewards must:
- When notified, complete annual training regarding the roles and responsibilities detailed in the Data Stewardship UOP;
- Understand the university’s security and other requirements, as well as those requirements contained in any applicable laws, regulations, with which they must comply to maintain the confidentiality, integrity, and availability of their specific data collection;
- Convey, in writing, these requirements to the departments that have access to their data collections;
- Work with Deans, Directors, and Department Chairs to determine the Authorized Users and an appropriate method of access for each data collection; and
- Ensure that contracts with third parties include provisions for maintaining the security of information to which the third party may have access.
5. General Requirements for Technology Managers
Technology Managers support computing and networking environments where University Information is collected, stored, transmitted, or processed. Security requirements for the functional work of Technology Managers are detailed in the Procedures. These include, for example, requirements for the maintenance of secure computing and network environments, routine system backup and encryption procedures, and the management of client workstation security, as applicable. Technology Managers must ensure high level systems integrity and direct that all access used by themselves and technical staff conform to the principle of least privilege.
6. General Responsibilities of Deans, Directors, and Department Chairs
Deans, Directors, and Department Chairs have additional responsibilities because of the supervisory role they have within their units. Deans, Directors and Department Chairs are not only responsible for understanding the security-related requirements of the University Information used within their departments, but must develop internal procedures that support the University’s objectives for security, including confidentiality, integrity, and availability of information. Theseprocedures must ensure that:
- specific issues related to transmission, storage, destruction, and access within their department are detailed;
- staff have the appropriate access to University Information and University Information Systems necessary for the performance of their jobs;
- staff do not have access to University Information and University Information Systems where that access is not necessary for them to satisfy the requirements of their jobs;
- this access is removed upon their separation from employment; and
- written confidentiality agreements are signed as applicable.
The Procedures include templates with standardized language to assist Deans, Directors, and Department Chairs with these requirements. Deans, Directors and Department Chairs are responsible for ensuring that their departmental procedures are communicated to their employees and are being followed.
7. Legal Requirements
The University is subject to federal, state, and international laws and regulations and contractual requirements (including, but not limited to, grants and research agreements) governing the security of information. The requirements generally vary according to the type of information being protected.
Agreements with third party vendors or consultants who will have access to confidential information must ensure that the vendor is subject to obligations of confidentiality that will enable the University to continue to comply with its own obligations under applicable laws and regulations.
Regulatory References/Citations
- Family Education Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99)
- Gramm-Leach Bliley Act (GLBA) (15 USC § 6801-6809)
- Health Information Technology for Economic and Clinical Health Act (HITECH) of HIPAA (45 CFR Parts160 and 164)
- Health Insurance Portability and Affordability Act (HIPAA) (45 CFR Parts 160, 162 and 164)
- The European Union’s General Data Protection Regulations (GDPR)
- Vermont Disclosure of Information Statute (18 V.S.A. § 7103)
- Vermont Protection of Personal Information (62 V.S.A. § 2430)
- Vermont Security Breach Notice Act (9 V.S.A. § 2435)
- Higher Education Act
Training/Education
Training Topic: | Annual Information Security Training (under development) |
---|---|
Training Audience: | All students and University Employees |
Method of Delivery: | TBD |
Delivered By: | Information Security Office |
Frequency: | Annual |
Training Topic: | Data Steward Training (under development) |
---|---|
Training Audience: | Data Stewards |
Method of Delivery: | TBD |
Delivered By: | Information Security Office |
Frequency: | Annual |
Related Documents/Policies
- Information Security Procedures
- Code of Conduct and Ethical Standards
- Computer, Communication, and Network Technology Acceptable Use Policy
- Data Breach Notification Policy
- Surplus Property and Disposal of Movable Equipment Policy
- FERPA Rights Disclosure Policy
- Intellectual Property Policy
- Privacy Policy
- Records and Documents Requests Policy
- Records Management and Retention Policy
- Subpoenas, Complaints, Warrants, and Other Legal Documents Policy