- Responsible Official:
- Chief Information Officer
- Responsible Office:
- Information Technology
- Effective Date:
- January 1, 2017
- Last Revision Date:
- December 28, 2016
- B-507 Safety and Risk Management
- IT-01010 Change Control Policy
- IT-01020 Data Classification and Control Policy
- IT-01030 User Authentication Policy
- IT-01040 Data Retention and Disposal Policy
- IT-01050 Paper and Electronic Media Policy
- IT-01060 Firewall, Router and Switch Administration Policy
- IT-01070 System Configuration Policy
- IT-01080 Anti-Virus Policy
- IT-01090 Backup Policy
- IT-01100 Encryption Policy
- IT-01110 Use of Personal Technology Devices Policy
- IT-01120 Software Development Policy
- IT-01130 Incident Response Policy
- IT-01140 Employee Identification Policy
- IT-01150 Risk Management Policy
- IT-01160 Cloud and Infrastructure Services Policy
- IT-01170 Data Storage Policy
- IT-01180 Ransomware Policy
- IT-02000 Acceptable Use Policy
All Portland Community College (PCC) employees, contractors, vendors, students and third-parties that create, use, maintain or handle PCC IT resources shall follow PCC’s Information Security Policy and related sub-policies. Policy shall be subject to and superseded by applicable regulations and laws.
Policy exemptions to Information Security Policy IT-01000 through IT-01170 will be permitted only when approved in advance and in writing by the Information Security Manager (ISM) or Chief Information Officer (CIO).
The Information Security Policy (ISP) consists of related policies IT-01000 through IT-01170. It applies to all users of PCC’s IT resources and supports the following goals:
- Promote a “security is everyone’s responsibility” philosophy to assist PCC in meeting its business and legal commitments.
- Ensure that PCC complies with all applicable laws and regulations.
- Ensure the integrity, reliability, availability and superior performance of IT resources.
- Ensure that users are protected from data breach and cybercrime.
- Ensure that use of IT resources is consistent with the principles and values that govern the use of other college facilities and services.
- Prevent unauthorized disclosure of critical information.
- Prevent disruption of the learning experience.
- Ensure the college is protected from financial, legal, regulatory and reputational harm.
- Ensure that IT systems are used for their intended purposes.
- Establish processes for addressing policy violations and sanctions for violators.
General Use and Responsibilities
(See IT-02010 through IT-02110 for supporting policies)
- Maintain current knowledge of, and comply with, the contents of the ISP.
- Distribute confidential and sensitive information on a limited basis to those with a business need to know the information.
- Protect all PHI, PII, PCI and other regulated or proprietary data from unauthorized access.
- Notify the Information Security Department and/or the IT Service Desk of any suspected breaches.
- Violation of the ISP may result in disciplinary action, up to and including expulsion from student activities, and/or termination of employment
- PCC reserves the right to report violations of federal, state and local laws and regulations governing computer and network use, as well as interactions that occur on the Internet, to authorities as deemed appropriate.
- Users who violate the AUP may be held liable for damages to PCC assets, including but not limited to the loss of information, computer software and hardware, lost revenue due to down time, fines and judgments imposed as a direct result of the violation.
- PCC reserves the right to deactivate a user’s access rights, whether or not the user is suspected of any violation of this policy, when necessary to preserve the integrity of IT Resources.
Information Security and general AUP violations shall be reported to the Information Security Manager or Chief Information Officer.
Non-security related violations (such as receipt of inappropriate content, other Human Resources policy violations, general college policy violations or regulatory compliance violations) shall be reported to a supervisor, HR or EthicsPoint.
Related Governing Standards, Policies and Guidelines
- United States Department of Education Guidance Letter
- Family Educational Rights and Privacy Act (FERPA)
- Federal Information Security Management Act (FISMA)
- Gramm-Leach-Bliley Act (GLBA)
- FTC Red Flag Rule
- Health Insurance Portability and Accountability Act (HIPAA)
- International Organization for Standardization (ISO):
- National Institute Standards and Technology (NIST)
- Payment Card Industry Data Security Standard (PCI DSS)
- Sarbanes-Oxley (Sox) for Colleges and Universities
- Cybercrime –
- Criminal activity or a crime that involves the Internet, a computer system, or computer technology.
- Data breach –
- An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. A data breach may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.
- ISP –
- Information Security Policy defines how PCC’s IT resources shall be protected.
- IT Resource –
- Information Technology resources are the property of PCC and include, but are not limited to all network related systems; business applications; network and application accounts; administrative, academic and library computing facilities; college-wide data, video and voice networks; electronic mail; video & web conferencing systems; access to the Internet; voicemail, fax machines and photocopiers; classroom audio/video; computer equipment; software and operating systems; storage media; Intranet, VPN, and FTP. IT Resources include resources administered by IT, as well as those administered by individual departments, college laboratories, and other college-based entities.
- PCI – Payment Card Industry –
- Data Security Standard. Promotes Payment Card Industry standards for the safety of cardholder data across the globe.
- PHI –
- Personal Health Information
- PII – Personally Identifiable Information –
- any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data can be considered PII.
- User –
- Any person who makes any use of any PCC IT resource from any location (whether authorized or not).