ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
|
|
|
- Berniece Stewart
- 9 years ago
- Views:
Transcription
1 ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse, misinterpretation, unnecessary restrictions to its access, or failure to maintain data quality or integrity. The purpose of this policy is to define access, controls and protection of the college s administrative data. Administrative data maintained by the institution is a vital information asset that will be available to all employees who have a legitimate need for it, consistent with the institution's responsibility to preserve and protect the integrity of the data, and to ensure the privacy of sensitive data. The institution is the owner of all administrative data; individual units or departments have stewardship responsibilities for data domains, or portions of the data. Designated Albright College data domains, data trustees, and data stewards are listed in Appendix A (Listing of Albright College Data Trustees and Data Stewards) of this policy. Adjustments to Appendix A will be incorporated as necessary over time, as additional enterprise data management systems are implemented, or as organizational and staffing changes warrant. Such changes will not be deemed a revision to this policy. APPLICABILITY Administrative data captured and maintained at Albright College are a valuable college resource. While these data may reside in different database management systems and on different machines, these data in aggregate may be thought of as forming one overarching, enterprise administrative database. This policy applies to all users of Albright s administrative database environment. POLICY Access to non-public administrative data is granted only via the appropriately designated Albright College Data Steward. By authorizing access to designated categories of administrative data, Data Stewards are acknowledging a legitimate user need for information access, as well as appropriate training and understanding on the part of the requesting user to ensure ongoing administrative data integrity, quality, protection, and privacy. In addition to authorizing new administrative data access requests, Data Stewards are responsible for an annual review of user security access to their respective data domains. By receiving access to designated categories of administrative data, the requesting data user is acknowledging responsibility for adherence to all relevant Albright policies, procedures, standards and guidelines. The college has defined three levels of data classification for administrative data: Public Data Restricted Data Highly Sensitive Data Page 1
2 Additional safeguards and protocols exist to further protect both Restricted and Highly Sensitive data, as appropriate. DATA CLASSIFICATIONS Public Data - General administrative data that are intentionally made public are classified as Public Data. This includes all general administrative data that are not legally restricted or judged by Data Stewards to be limited access data. Examples of Public Data include the Albright Master Course Schedule as well as faculty, staff and student directory data. Public Data are often readily available on Albright s public website. Restricted Data - By default, all administrative data not explicitly defined as either Highly Sensitive or Public are classified as Restricted Data. Examples of Restricted Data include student grades and faculty/staff salaries. Appropriate safeguards, including data access authorization and approvals by Data Stewards, must exist for all data that the college is obligated to protect, whether by law, contract, or college policy. Secure credentials are required to access restricted university data. Standards or guidelines governing the access, release, distribution and dissemination of restricted data by individuals authorized to access it is controlled and administered by the designated Data Stewards. Highly Sensitive Data Highly Sensitive Data are by definition restricted and include personal information that can lead to identity theft if exposed or disclosed in an unauthorized manner. Specifically, the college defines the following as Highly Sensitive Data: The first name or first initial and last name in combination with and linked to any one or more of the following data elements about the individual: Social security number Driver s license number or state identification card number issued in lieu of a driver s license number Passport number; or Financial/banking account number, credit card number, or debit card number. Electronic Storage of Highly Sensitive Data Procedures - Additional safeguards and protocols exist to ensure Albright constituent privacy and to protect Highly Sensitive Data from unauthorized exposure. Like Restricted Data, access to Highly Sensitive Data may only be authorized by Data Stewards. Further, Highly Sensitive Data must not be stored or kept on any non-network storage device or media. Prohibited storage media includes storage on desktop computers, laptop computers, PDAs, cell phones, USB drives, thumb drives, memory cards, CDs, DVDs, local external hard drives and other USB devices, unless specifically approved encryption methodologies have been utilized. Further, Highly Sensitive data cannot be distributed, including via or attachment, unless via approved encrypted means. Exceptions to the procedures for the electronic storage of Highly Sensitive Data must be approved by the appropriate division Vice President in consultation with the Chief Technology Officer. Approved exception requests will be documented to ensure the implementation of acceptable data encryption protocols. RESPONSIBILITY OF DATA TRUSTEES, DATA STEWARDS AND DATA USERS Page 2
3 Data Trustee: Data Trustees are the senior College officials (typically at the level of Vice President) who have planning and policy level responsibilities for data within their functional areas and management responsibility for defined segments of institutional data, or data domains. The Data Trustees, as a group, are responsible for overseeing the establishment of data management policies and procedures and for the assignment of data management accountability. Data Trustees typically serve as the executive sponsors of technology projects involving institutional data management. Data Trustees work with the Chief Technology Officer to prioritize data management related projects and to ensure that the appropriate resources are available to support the data needs of the College. Data Trustee responsibilities include: Assigning and overseeing Data Stewards Overseeing the establishment of data policies in their areas Determining legal and regulatory requirements for data in their areas Promoting and ensuring appropriate data use and data quality Addressing institutional data issues that a.) potentially compromise data integrity, reliability, privacy or b.) potentially limit or reduce institutional effectiveness or efficiency Data Stewards: Data Stewards are appointed by Data Trustees. Data Stewards have primary responsibility for the accuracy, integrity, privacy, and security of the College Data under his/her stewardship. They have overall responsibility for appropriate system use and data maintenance procedures within their areas, including the administration of any additional policies or procedures to govern the use of legally protected, restricted or sensitive college data. Additional responsibilities include: Communicating with and educating data users on appropriate use and protection of institutional data Developing and documenting procedures for requesting and authorizing access to restricted administrative data. Testing, approving, and authorizing the production implementation (or go-live ) of new, upgraded, or updated software programs pertaining to administrative data management and software systems (such as PowerCampus, PowerFaids, Great Plains, and Millenium, etc.). Working with and appropriate Records Management officials to determine data retention requirements and archiving strategies for storing and preserving historical operational data. Working with ITS and the Data Management Group to ensure that a common set of data definitions is consistently used and applied, to facilitate data driven decision making, to enhance the ability for automated system interfaces, and to generally improve the electronic exchange of data across the enterprise. Assure data integrity, respond to questions about the accuracy of data, and correct inconsistencies. Assure data collection is complete, accurate, valid, timely, and that data are maintained as close as is possible to the source or creation point of the data. Establish and maintain business rules regarding the manipulation, modification, or reporting of administrative data elements and for creating derived elements in support of accurate data integration efforts, automated business process improvement projects, or other college planning and assessment efforts. Work with to monitor and periodically review (at least once annually) individual user security profiles and authorized data access. Data Users: Data Users are the individuals who access college data (in accordance with authorization by the appropriate Data Steward) in order to perform their assigned duties or to fulfill their role in the college community. Data Users are responsible for protecting their access and authentication privileges, the proper use of the college administrative data and the protection of confidentiality and privacy of individuals whose records they access. Users will comply with all reasonable protection and Page 3
4 control procedures for administrative data to which they have been granted the ability to view, copy, download, create, modify or delete. Data Management Group: A college-wide group composed of management, Data Stewards, and interested Data Users which meets regularly to review data management activities and planned projects and upgrades, as well as to generally communicate and coordinate regarding relevant business rules, data integration, systems interoperability, and business process improvement. The Data Management Group makes recommendations to Data Trustees, as appropriate. It is the responsibility of to convene and coordinate Data Management Group meetings. APPROVALS AND REVISIONS Approved by President s Advisory Council, January 24, 2012 Page 4
5 APPENDIX A (Listing of Albright College Data Trustees and Data Stewards) Data Domain Data Trustee Data Steward Traditional Undergraduate Admission Data VP for Enrollment Management and Dean of Admission Director of Enrollment & Information Services ADP Admission and Student Data Provost and VP for Academic Affairs Director of the Accelerated Degree Programs Graduate Admission Data Provost and VP for Academic Affairs Director of the Graduate Program Traditional Student Academic Provost and VP for Academic Affairs Registrar Data, Course Schedules and Enrollment Data Housing Data VP for Student Affairs and Dean of Students Director of Housing & Student Affairs / International Students & Community Standards VP for Student Affairs and Dean of Students Residential Learning Assistant Dean of Students Health Services Data VP for Student Affairs and Dean of Students Assistant Dean of Students & Director of the Gable Health Center Finance & Student Accounting VP for Administrative and Financial Services Associate VP / Controller Data ID Card/Access Data ID Card/Dining, Vending, Debit VP for Student Affairs and Dean of Students VP for Administrative and Financial Services Director of Public Safety Senior Accountant Human Resource Data VP for Administrative and Financial Services Associate VP and Director of Human Resources Payroll Data VP for Administrative and Financial Services Associate VP / Controller Public Safety Data VP for Student Affairs and Dean of Students Director of Public Safety Student Financial Aid Data VP for Enrollment Management and Director of Financial Aid Dean of Admission Advancement /Alumni Data VP for Advancement Director of Advancement Information Systems Athletics Data VP for Enrollment Management and Director of Athletics Dean of Admission Learning Management System Provost and VP for Academic Affairs LMS Application Administrator Parent Data VP for Advancement Director of Advancement Information Systems Comparative Institutional Data Provost and VP for Academic Affairs Director, Institutional Research Page 5
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
Institutional Data Governance Policy
Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.
Data Management Standard
Data Management Standard Revision: Version 1.0 Date: 11/2015 Status: Approved by ISAC, Reviewed by Chancellor s Cabinet 1. Objectives Page 1 2. Scope Statement. Page 1 3. Requirements..Page 1 4. Definitions
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
University of Michigan Medical School Data Governance Council Charter
University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
Institutional Data Governance Policy
Institutional Data Governance Policy Vanderbilt University and Medical Center Effective Date: 07/09/2014 Revision Date: N/A DOCUMENT CONTROL Document Title Institutional Data Governance Policy Summary:
CREDIT CARD SECURITY POLICY PCI DSS 2.0
Responsible University Official: University Compliance Officer Responsible Office: Business Office Reviewed Date: 10/29/2012 CREDIT CARD SECURITY POLICY PCI DSS 2.0 Introduction and Scope Introduction
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12)
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) I. Definition Data governance is the exercise of authority and control (planning, monitoring, and enforcement) over the management
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
Data Warehouse_policy_ BHP 2004 FINAL.doc
Information Use and Standards Policy for the Bentley Data Warehouse 1 February 5, 2004 I. Introduction: Administrative data, owned by Bentley and maintained by various departmental stewards, is a valuable
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
Identity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
STATEMENT OF VALUES AND CODE OF ETHICS
STATEMENT OF VALUES AND CODE OF ETHICS INTRODUCTION The Smithsonian Institution is a public trust whose mission is the increase and diffusion of knowledge. The Smithsonian was established by the United
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Cal Poly Information Security Program
Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
Information Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
University Policy No.: AC1135 Classification: Academic and Students
POLICY FOR THE ESTABLISHMENT OF CERTIFICATE AND DIPLOMA PROGRAMS University Policy No.: AC1135 Classification: Academic and Students Approving Authority: Senate Effective Date: December/07 Supersedes:
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
SOUTHERN UNIVERSITY SYSTEM POLICIES AND PROCEDURES. I. Policy Statement
Name of Policy: Southern University System Data Governance Policy Policy Number: Issuing Authority: SUS Office of the President Initial Effective Date: On Presidential Approval X New Policy Proposal Major
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Massachusetts Identity Theft/ Data Security Regulations
Massachusetts Identity Theft/ Data Security Regulations Effective March 1, 2010 Are You Ready? SPECIAL REPORT All We Do Is Work. Workplace Law. In four time zones and 45 major locations coast to coast.
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
Information Security Plan May 24, 2011
Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Wright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
Rules of Organization and Bylaws Gladys A. Kelce College of Business
Rules of Organization and Bylaws Gladys A. Kelce College of Business Approved by the General Faculty December 11, 2012 PREAMBLE This document provides the framework within which the Faculty of the Gladys
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
IT Security Incident Response Protocol McGill University
1 of 5 Issued: November 15, 2008 Issued by: Chief Information Officer IT Security Incident Response Protocol McGill University November 15, 2008 applying to IT facilities run by administrative units March
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
Policy on the Security of Informational Assets
Policy on the Security of Informational Assets Policy on the Security of Informational Assets 1 1. Context Canam Group Inc. recognizes that it depends on a certain number of strategic information resources
Data Management & Protection: Common Definitions
Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79
CHAPTER 149 FORMERLY SENATE SUBSTITUTE NO. 1 FOR SENATE BILL NO. 79 AN ACT TO AMEND TITLE 14 OF THE DELAWARE CODE RELATING TO EDUCATIONAL DATA GOVERNANCE. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE
University of Michigan School of Music, Theatre & Dance Conflicts of Interest and Conflicts of Commitment Staff Policy
Introduction University of Michigan School of Music, Theatre & Dance Conflicts of Interest and Conflicts of Commitment Staff Policy Standard Practice Guide (SPG) 201.65-1, Conflicts of Interest and Conflicts
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS
THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS This form allows students to grant third parties, including parents, access to their educational records
Standard. Information Security - Information Classification. Jethro Perkins. Information Security Manager. Page 1 of 12
Standard Information Security - Information Classification Jethro Perkins Information Security Manager Page 1 of 12 Document control Distribution list Name Title Department Nick Deyes Director of Information
How To Manage Information Security At A University
Data Management & Protection: Roles & Responsibilities Document Version: 1.0 Effective Date: December, 2008 Original Issue Date: December, 2008 Most Recent Revision Date: November 29, 2011 Approval Authority:
September 28 2011. Tsawwassen First Nation Policy for Records and Information Management
Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
IDENTITY MANAGEMENT AND COMMON SYSTEM ACCESS HUMBOLDT STATE UNIVERSITY. Audit Report 12-46 December 21, 2012
IDENTITY MANAGEMENT AND COMMON SYSTEM ACCESS HUMBOLDT STATE UNIVERSITY Audit Report 12-46 December 21, 2012 Henry Mendoza, Chair William Hauck, Vice Chair Lupe C. Garcia Steven M. Glazer Hugo N. Morales
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
