Skip to main content

3-42 Information Security Policy

About CMU's "Responsibility for institutional data and information system access and controls policy"

This policy establishes roles and responsibilities for ensuring the safe, confidential storage of and access to institutional data. Along with other policies and procedures, this policy provides authority to the Chief Information Officer and Chief Information Security Officer to ensure CMU can monitor, assess and address information security risk.

NOTE ABOUT PDF VERSION: The PDF is the official text of the policy. If there are any incongruities between the text of the HTML version and the text within the PDF file, the PDF will be considered accurate and overriding.

PURPOSE

Central Michigan University (“CMU”) has adopted the following Information Security Policy (“Policy”) as a measure to protect the confidentiality, integrity and availability of Institutional Data as well as any Information Systems that store, process or transmit Institutional Data. This policy applies broadly to all Institutional Data, regardless of its form (electronic - in an IT system, physical - on paper, or ephemeral - a voice conversation), and applies to all faculty, staff, students and third- party Agents of the University as well as any other CMU affiliate who is authorized to access Institutional Data.

PRINCIPLES 

  • Supporting its mission as an educational institution, CMU puts its people first. We recognize that the faculty, staff and students within our community are our strongest security asset, but also our greatest vulnerability.
  • CMU's approach to information security is nuanced. As our data becomes more sensitive and requires more protection, we augment that protection with additional administrative, technical, and physical controls.
  • CMU's approach to information security allows our faculty, staff and students the rights to bring their own devices and to enjoy relatively liberal access to CMU data, but also emphasizes their responsibility to exercise good, well- informed judgment in their use of CMU’s systems and data.
  • CMU maintains policies, guidelines, standards and other documents (see "Additional Information" below) to bring structure to our strategy and to act as resources for our faculty, staff and students.

POLICY STATEMENTS 

(to be supported by Protocols and Standards as appropriate, see "Additional Information" below)

  1. Throughout its lifecycle, all Institutional Data shall be protected in a manner that is considered reasonable and appropriate, as defined in documentation approved and maintained by the Chief Information Security Officer (“CISO”), given the level of sensitivity, value and criticality that the Institutional Data has to the University.
  2. Any Information System that stores, processes or transmits Institutional Data shall be secured in a manner that is considered reasonable and appropriate, as defined in documentation approved and maintained by the CISO, given the level of sensitivity, value and criticality that the Institutional Data has to the University.
  3. Individuals who are authorized to access Institutional Data shall adhere to the appropriate Roles and Responsibilities, as defined in documentation approved and maintained by the CISO.

RESPONSIBILITY FOR COMPLIANCE

 
Task
 
Cabinet
 
CIO
 
CISO
 
IT Staff
 
Faculty
 
Staff
 
Students
Maintenance of PolicyACRCIII
Maintenance of Standards and Guidelines ARCIII
Training and Awareness ARC, RIII
Design of Controls ARCCCC
Implementation of Controls IAC, RRRR
Monitor and Audit Controls ARR   

R = Responsible - The person who actually carries out the task

A = Accountable - The person who is ultimately accountable for the task being completed appropriately

C = Consulted - People who are not directly involved in carrying out the task, but are consulted during its completion

I = Informed - Those who receive output from the task with opportunity to comment or need to be informed of its progress or completion 

RISK ASSESSMENT

The Office of Information Technology will work in coordination with the Office of Internal Audit to regularly and routinely assess risk to the university’s technology environment. Results of these assessments will be used to inform OIT planning and protections and may be shared with relevant committees. 

ENFORCEMENT 

Enforcement of this policy will be managed by the CISO under the guidance of the Chief Information Officer (“CIO”). Violations of this Policy may result in suspension or loss of the violator’s use privileges with respect to Institutional Data and CMU-owned Information Systems. Additional administrative sanctions may apply up to and including termination of employment or contractor status with CMU. Civil, criminal, and equitable remedies may apply. 

EXCEPTIONS 

Exceptions to this Policy must be approved by the CISO under the guidance of the CIO and formally documented. Policy exceptions will be reviewed by the CISO on a periodic basis for appropriateness.  

DEFINITIONS 

  • Agent, for the purpose of this Policy, is defined as any third party that has been contracted by CMU to provide a set of services and who accesses, stores, processes, or transmits Institutional Data as part of those services.
  • Information System is defined as any electronic system that stores, processes, or transmits information
  • Institutional Data are defined as any data (digital or physical) that are owned or licensed by the University, including “University’s information” as defined in the Data Stewardship Policy as:

“The University's information includes, but is not limited to, any physical or digital information within its purview, including information which it may not own but which is governed by laws and regulations to which the University is held accountable. It includes all student record data, all personnel data, research data (including that collected from human and animals), all University financial data, all student life data, all departmental administrative data, all alumni and donor data, all library circulation data, medical data protected under HIPAA and ADA legislation, and all other data that pertain to, or support the administration of, the University. These data may be facts, records, reports, planning assumptions, or any information meant only for internal use and /or subject to confidentiality agreements.”

  • Technical Controls are defined as digital (as opposed to physical) controls applied to information systems and technologies – for instance, the requirement to enter a password on login is a technical control.

MAINTENANCE 

This Policy will be reviewed annually by the CIO and CISO.

ADDITIONAL INFORMATION 

Questions or concerns related to this Policy should be directed to CMU’s CISO at 989.774.6633. Additional information can also be found using the following resources:

Central Michigan University reserves the right to make exceptions to, modify or eliminate this policy and or its content. This document supersedes all previous policies, procedures or guidelines relative to this subject.