This document provides the University of Central Missouri Information Security Program developed in accordance with Gramm-Leach-Bliley Act Safeguards Rule, 16 C.F.R. 搂314.1 to 搂314.6 and the National Institute of Standards and Technology (NIST) special publication 800-171 Rev. 2 鈥淧rotecting Controlled Unclassified Information in Nonfederal Systems and Organizations鈥 recommended by the Department of Education as a security standard to support continuing obligations under GLBA.
Confidential Information is a classification for systems or data that, if made available to unauthorized parties, may adversely affect individuals or the university. This classification includes information required to be protected from disclosure by law or industry regulation (i.e. PII, student data, financial data, medical data, etc.) This classification may also be applied to information systems with access to confidential data, or systems designated as 鈥淗igh Risk鈥.
Personal Identifiable Information (PII) is any information about an individual maintained by an agency, including:
(1) any information that can be used to distinguish or trace an individual鈥榮 identity, such as name, social security number, date and place of birth, mother鈥榮 maiden name, or biometric records; and
(2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.
Protected information refers to systems or data classified as Confidential or Restricted used in university operations where the confidentiality, integrity, or availability must be protected from disclosure as required by law, regulation, university policy, or moral obligation.
Restricted Information is a classification for systems or data used to conduct university business not intended for public disclosure nor classified as confidential (i.e. intellectual property, software licenses, information relating to contractual obligations, etc.).
The information security program contains administrative, technical, and physical safeguards that are appropriate to the size and complexity of the university to:
The scope of this program includes all information systems and technology resources used and/or collected by the university, including third party systems used to store, process, or transmit university data.
University of Central Missouri Board of Governors Policy 1.2.040 provides authority to the university president to delegate authority to the Chief Information Officer (CIO) to take prudent steps to secure the university鈥檚 information technology resources.
The CIO delegated responsibility for information security to the Information Security Officer (ISO) to develop a strategic plan for information security to set priorities for how to address the management, control, and protection of the university鈥檚 information assets.
The Vice President for Finance and Operations oversees Accounting Services, Budget and Finance, Human Resources, University Analytics and Institutional Research, Office of Technology, and Facilities Planning and Operations. The CIO reports to the Vice President for Finance and Operations and provides a review of security measures as they relate to those areas.
The following key roles are assigned to individuals responsible for management of UCM鈥檚 information system security program, coordination among organizational entities, and compliance.
Vice President for Finance and Operations: Senior university official responsible for reporting the status and material matters of the Information Security Program to the Board of Governors.
Chief Information Officer (CIO): Responsible for designating an individual to manage the university鈥檚 information security program and providing resources necessary to ensure successful implementation of the program.
Information Security Officer (ISO): Responsible for management and oversight of the information security program to ensure the confidentiality, integrity, and availability of the university鈥檚 information systems and data.
Information Systems owned and operated by third party organizations and students may operate on the university network and are responsible for adhering to UCM鈥檚 Acceptable Use Policy. Information security of these systems and the data they collect and store is the sole responsibility of the respective organizations and users.
This program is based on a risk assessment that identifies reasonably foreseeable internal and external risks to the confidentiality, integrity, and availability of protected information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of any safeguards in place to control these risks.
The ISO shall develop information security policies, standards, and procedures based on guidance from the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-171 鈥淧rotecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations鈥. These policies and standards formally establish the university鈥檚 information security program and set forth employee responsibility to protect the university鈥檚 information systems. Policies and standards are located in the University Policy Library and the Office of Technology Information Security webpage.
The ISO shall design and implement safeguards to control risks identified through risk assessment, including:
The ISO shall periodically test and monitor the effectiveness of Safeguards鈥 key controls, systems, and procedures, including those to detect actual or attempted attacks on, or intrusions into, information systems.
Vulnerability assessments shall be conducted periodically, at least every six months; and whenever there are material changes to operations or business arrangements; and whenever there are circumstances that may have a material impact on the information security program. Identified vulnerabilities shall be remediated in a timely manner based on the severity of the vulnerability.
Information systems containing confidential information shall be subject to penetration testing at least annually based on relevant identified risks in accordance with the risk assessment.
The ISO shall implement an Information Security Awareness and Training program to make employees and students aware of risks to personal and institutional information and information technology, and to provide them with the skills and knowledge necessary to avoid those risks.
The training program shall include role-based training to users who manage confidential information and to security practitioners sufficient to address security risks and maintain current knowledge of changing information security threats and countermeasures.
The university shall take reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for confidential information.
Any person or entity external to the university that receives, maintains, processes, or otherwise is permitted access to confidential information used in support of the university mission shall be required by contract to implement appropriate safeguards to protect the information from unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information.
Periodic assessments of service providers shall be performed based on the risk they present and the continued adequacy of their safeguards.
The ISO shall establish a written Incident Response Plan to promptly respond to, and recover from, any security event materially affecting the confidentiality, integrity, or availability of confidential information in the university鈥檚 control.
The ISO shall report in writing, semi-annually, to the CIO. The Vice President of Finance and Operations shall report, at least annually, to the board of Governors. The report shall include the following information:
(1) The overall status of the information security program and compliance with legal or regulatory requirements; and
(2) Material matters related to the information security program, addressing issues such as risk assessment, risk management and control decisions, service provider arrangements, results of testing, security events or violations and management's responses thereto, and recommendations for changes in the information security program.
The ISO shall review the information security program periodically to make necessary changes based upon results of testing and monitoring, changes to operations, results of risk assessments, or any other circumstances that impact the information security program.