Executive Memorandum No. 26
University of 玉米视频 Information Security Plan - Gramm Leach Bliley Compliance (effective May 23, 2003)
General Provisions
This Information Security Plan ("Plan") describes the University of 玉米视频's safeguards to protect covered data and information. These safeguards are provided to:
- Ensure the security and confidentiality of covered data and information;
- Protect against anticipated threats or hazards to the security or integrity of such information; and
- Protect against unauthorized access to or use of covered data and information that could result in substantial harm or inconvenience to the individual to whom the information pertains.
This Plan also provides for mechanisms to:
- Identify and assess the risks that may threaten covered data and information maintained by the University;
- Develop written policies and procedures to manage and control these risks;
- Implement and review the Plan; and
- Adjust the Plan to reflect changes in technology, the sensitivity of covered data and information and internal or external threats to information security.
Covered Data and Information
In this Plan, the term "covered data and information" is defined as and includes Student Financial Information (defined below) required to be protected under the Gramm Leach Bliley Act (GLB), as well as any credit card information received in the course of business by the University, whether or not such credit card information is covered by GLB. Covered data and information includes both paper and electronic records. "Student Financial Information" is that information that the University has obtained from a student in the process of offering a financial product or service, or such information provided to the University by another financial institution. Offering a financial product or service includes offering student loans to students, receiving income tax information from a student's parent when offering a financial aid package, and other miscellaneous financial services as defined in 12 C.F.R. § 225.28. Examples of student financial information include addresses, phone numbers, bank and credit card account numbers, income and credit histories and Social Security numbers, in both paper and electronic format.
Identification and Assessment of Risks to Customer Information
The University recognizes that it has both internal and external risks. These risks include, but are not limited to:
- Unauthorized access of covered data and information by someone other than the owner of the covered data and information
- Compromised system security as a result of system access by an unauthorized person
- Interception of data during transmission
- Loss of data integrity
- Physical loss of data in a disaster
- Errors introduced into the system
- Corruption of data or systems
- Unauthorized access of covered data and information by employees
- Unauthorized requests for covered data and information
- Unauthorized access through hard copy files or reports
- Unauthorized transfer of covered data and information through third parties
The University recognizes that this may not be a complete list of the risks associated with the protection of covered data and information. Since technology growth is not static, new risks are created regularly. Accordingly, the Department of the University of 玉米视频 Computing Services Network ("UNCSN") will actively participate and monitor advisory groups such as the Educause Security Institute, the Internet2 Security Working Group and SANS for identification of new risks.
Information Security Plan Coordinators
The Chief Information Security Officer for the University of 玉米视频 System is appointed as the coordinator of this Plan. In addition, each campus shall appoint a Campus Plan Coordinator to join with the Chief Information Security Officer to provide support in carrying out this Plan throughout the University. These five individuals will determine which University areas, departments and persons have access to covered data and information and will assess whether controls are in place to verify that these University areas, departments and persons comply with the requirements of this Plan. Further, they are responsible for assessing the risks associated with unauthorized transfers of covered data and information and implementing procedures to minimize those risks to the University.
Design and Implementation of Safeguards Program
Employee Management and Training
Important information concerning the use of University information systems can be found in Presidential Executive Memorandum No. 16, Responsible Use of Computers and Information Systems, which discusses authorized access and other activities considered to be misuse of the University information system. Employees should be made aware of the existence and contents of Executive Memorandum No. 16, which is incorporated into this Plan by reference. Executive Memorandum No. 16 may be found at www.nebraska.edu. A serious and concerted effort shall be made to inform students and employees of the existence and contents of this Plan, using such means as are appropriate to educate the University community about this matter.
Design and Implementation of Safeguards Program
Employee Management and Training
Important information concerning the use of University information systems can be found in Presidential Executive Memorandum No. 16, Responsible Use of Computers and Information Systems, which discusses authorized access and other activities considered to be misuse of the University information system. Employees should be made aware of the existence and contents of Executive Memorandum No. 16, which is incorporated into this Plan by reference. Executive Memorandum No. 16 may be found at www.nebraska.edu. A serious and concerted effort shall be made to inform students and employees of the existence and contents of this Plan, using such means as are appropriate to educate the University community about this matter.
References of new employees working in areas that regularly work with covered data and information (e.g. Bursar's Office, Registrar, Financial Aid, Human Resources, Libraries, Payroll) shall be checked with particular attention paid to any information that may reflect upon the employees ability and aptitude to treat covered data and information confidential in accordance with the law and University policy. During employee orientation, each new employee in those departments identified as regularly working with covered data and information will receive proper training on the importance of confidentiality of student records, student financial information, and other types of covered data and information. Each new employee shall receive training in the proper use of computer information systems and passwords. Training shall include controls and procedures to prevent employees from providing confidential information to unauthorized individuals and how to properly dispose of documents that contain covered data and information.
Each department responsible for maintaining covered data and information shall take serious and meaningful steps to protect information from destruction, loss or damage due to environmental hazards, such as fire and water damage or technical failures. Further, each department responsible for maintaining covered data and information will regularly contact its campus Department of Human Resources to arrange for additional training on information privacy appropriate to the department. These training efforts should aim to minimize risk and safeguard covered data and information.
Information Systems
Access to covered data and information via the University's computer information system is limited to those employees who have a business reason to know such information. Each employee is assigned a user name and password. Databases containing personal covered data and information, including, but not limited to, accounts, balances, and transactional information, are available only to University employees in appropriate departments and positions.
The University will take reasonable and appropriate steps consistent with current technological developments to provide for the security, safety and integrity of all covered data and information of records in storage and transmission. UNCSN requires that all servers must be registered before being allowed through the University's firewall, thereby allowing UNCSN to verify that the system meets necessary security requirements as deemed appropriate by UNCSN practices and policies. These requirements include maintaining the operating system and applications, along with the application of appropriate patches and updates, in a timely fashion. Each campus and UNCSN will implement a written Password Policy for user and system passwords, designed to provide meaningful security within the system parameters and needs of each campus and Central Administration. In addition, an intrusion detection system shall be implemented to detect and stop certain external threats. An Incident Response Policy for occasions where intrusions do occur shall be implemented on each campus and at UNCSN.
When commercially reasonable, encryption technology will be utilized for both storage and transmission. All covered data and information will be maintained on servers that are behind the University's firewall.
All firewall software and hardware maintained by UNCSN will be kept current. UNCSN will continue to develop and implement policies and procedures to provide security to the University's information systems. Further, UNCSN will provide campuses with coordination and support to develop and implement similar policies. These policies shall be distributed to the University community and other information providers through posting on University websites and other means deemed appropriate.
The University will not use Social Security Numbers to identify students, employees, or other information providers, outside of those identification uses allowed by law for University authorized institutional research purposes, or specifically required by law, such as in financial aid, payroll and benefit functions.
Management of System Failures
UNCSN and each campus shall without undue delay develop written plans and procedures to detect any actual or attempted attacks on University systems, along with an Incident Response Policy which outlines procedures for responding to an actual or attempted unauthorized access to covered data and information. This policy shall be distributed to the University community and other information providers through posting on University websites and other means deemed appropriate.
Selection of Appropriate Service Providers
Due to the specialized expertise needed to design, implement, and service new technologies, vendors may be needed to provide resources that the University determines not to provide on its own. In the process of choosing a service provider that will maintain or regularly access covered data and information, the evaluation process shall include the ability of the service provider to safeguard confidential financial information. Contracts with service providers may include the following provisions:
- An explicit acknowledgment that the contract allows the service provider access to confidential information;
- A specific definition or description of the confidential information being provided;
- A stipulation that the confidential information will be held in strict confidence and accessed only for the explicit business purpose of the contract;
- An assurance from the service provider that it will protect the confidential information it receives from the University according to commercially acceptable standards and no less rigorously than it protects its own confidential information;
- A provision providing for the return or destruction of all confidential information received by the service provider upon completion or termination of the contract;
- An agreement that any violation of the contract's confidentiality conditions may constitute a material breach of the contract and entitles the University to terminate the contract without penalty; and
- A provision ensuring that the contract's confidentiality requirements shall survive any termination agreement.
Attached to this Plan is a model contract provision for Service Providers . Contracts entered into prior to June 24, 2002, are grandfathered for purposes of compliance with GLB until May 24, 2004. All existing contracts entered into on or after June 24, 2002, and all future contracts should contain provisions substantially similar to the attachment.
Continuing Evaluation and Adjustment
This Information Security Plan will be subject to periodic review and adjustment. The most frequent of these reviews will occur within UNCSN, where constantly changing technology and evolving risks mandate increased vigilance. Similar reviews shall be directed by the Campus Plan Coordinators on their respective campuses. Continued administration of the development, implementation and maintenance of the program will be the responsibility of the five Plan Coordinators who will assign specific responsibility for implementation and administration as appropriate. The Plan Coordinators will review the standards set forth in this policy and recommend updates and revisions as necessary. It may be necessary to adjust the Plan to reflect changes in technology, the sensitivity of covered data and information, and internal or external threats to information security.
Reference:
September 9, 2014
COOKIE USAGE:
The University of 玉米视频 System uses cookies to give you the best online experience. By clicking "I Agree" and/or continuing to use this website without adjusting your browser settings, you accept the use of cookies.