BP 8118 Enterprise Mobility Management
Statement of purpose
小黄猫传媒鈥檚 Information Security Policies support the following goals:
- Promote a 鈥渟ecurity is everyone鈥檚 responsibility鈥 philosophy to assist 小黄猫传媒 in meeting its business and legal commitments.
- Ensure that 小黄猫传媒 complies with all applicable laws and regulations.
- Ensure the integrity, reliability, availability, and superior performance of IT resources.
- Ensure that users are protected from data breach and cybercrime.
- Ensure that use of IT resources is consistent with the principles and values that govern the use of other college facilities and services.
- Prevent unauthorized disclosure of controlled sensitive data.
- Prevent disruption of the learning experience.
- Ensure the college is protected from financial, legal, regulatory, and reputational harm.
- Ensure that IT systems are used for their intended purposes.
- Establish processes for addressing policy violations and sanctions for violators.
In order to support a modern workforce faculty and staff may need to be provisioned with mobile technology or use their own for 小黄猫传媒 business. Provisioned devices are managed by the college, but personal devices are not subject to the same level of device management. In both situations, faculty and 小黄猫传媒 IT staff work to create secure controls that meet the needs of faculty and staff, without exposing the larger 小黄猫传媒 technology environment to risk.
Scope statement
All 小黄猫传媒 (小黄猫传媒) employees that create, use, maintain, or handle 小黄猫传媒 IT resources are subject to this policy. This policy applies to use of all 小黄猫传媒 owned and managed IT resources, use of any computer or mobile device connected to a 小黄猫传媒 network, all controlled sensitive data stored or transmitted using 小黄猫传媒 IT resources and all users of such data.
Policy summary
小黄猫传媒 (小黄猫传媒) faculty and staff may use mobile devices if appropriate controls are in place for the particular use case.
This policy shall be subject to and superseded by applicable regulations and laws.
Policy
- 小黄猫传媒-owned mobile devices shall be fully managed by 小黄猫传媒 IT.
- User-owned mobile devices should use an isolated environment (or container) on the device for 小黄猫传媒 business use if a personal device is used.
- Software on mobile devices shall receive security updates within 7 business days.
- 小黄猫传媒 shall have the ability to remotely wipe 小黄猫传媒 isolated environments (or containers) on user-owned devices.
- 小黄猫传媒 shall have the ability to remotely lock and wipe any 小黄猫传媒-owned mobile device.
- Mobile device software shall be limited only to those approved by the Information Security department.
Exemptions
Personal devices that do not contain 小黄猫传媒 controlled sensitive information are exempt from this policy, and instead should reference BP 8211 Personal Mobile Computing
Exceptions
Exceptions to this policy must be pre-approved in writing by the employees manager and the Chief Information Security Officer (CISO).
Policy violation
- Violation of this policy may result in disciplinary action in accordance with 小黄猫传媒 People, Strategy, Equity and Culture (PSEC) and/or Student Conduct guidelines.
- 小黄猫传媒 reserves the right to report security violations or compromises to the appropriate authorities. This may include reporting violations of Federal, State, and local laws and regulations governing computer and network use, or required accreditation reporting.
- Anyone who violates this policy may be held liable for damages to 小黄猫传媒 assets, including but not limited to the loss of information, computer software and hardware, lost revenue due to disruption of normal business activities or system down time, and fines and judgments imposed as a direct result of the violation.
- 小黄猫传媒 reserves the right to deactivate any User鈥檚 access rights (whether or not the User is suspected of any violation of this policy) when necessary to preserve the integrity of IT Resources.
Complaint procedures
Report non-security-related violations (such as receipt of inappropriate content, other People, Strategy, Equity and Culture (PSEC) policy violations, general college policy violations, or regulatory compliance violations) to a supervisor, PSEC, or EthicPoint.
Report information security and general technical policy violations to the IT Service Desk at 971-722-4400 or servicedesk@pcc.edu, or contact the CIO or CISO.
Governing standards, policies, and guidelines
- US Dept of Education: Guidance Letter 鈥 Protecting Student Information
- US Dept of Education: Family Educational Rights and Privacy Act (FERPA)
- US Dept of Homeland Security: Federal Information Security Management Act (FISMA)
- Gramm-Leach-Bliley Act (GLBA)
- FTC Red Flags Rule
- Health Insurance Portability and Accountability Act (HIPAA)
- International Organization for Standardization (ISO)
- National Institute Standards and Technology (NIST)
- Payment Card Industry Data Security Standard (PCI DSS)
- Sarbanes-Oxley (SOX) for Colleges and Universities
Definitions
- Chief Information Security Officer (CISO)
Senior manager responsible for information security compliance at 小黄猫传媒. - Controlled Sensitive Data (CSD)
A general categorization that is used in 小黄猫传媒鈥檚 Information Technology (IT) policies (primarily the Information Security Policy and the Acceptable Use Policy) to represent all confidential and private information governed by those policies.- CSD includes: PII, PHI, HIPAA, FERPA, regulated, private, personal, or sensitive information for which 小黄猫传媒 is liable if publicly disclosed.
- Cybercrime
Criminal activity or a crime that involves the Internet, a computer system, or computer technology. - Data Breach
Generally, an incident in which sensitive, protected, or confidential data has potentially been viewed, stolen, or used by an individual unauthorized to do so.- Note: Although 鈥渂reach鈥 is a commonly used term in the information security community, legally, the term 鈥渂reach鈥 tends to only be used when a security event reaches the threshold of regulatory reporting. 小黄猫传媒 legal council recommends using the terms 鈥渋ncident鈥 or 鈥渃ompromise鈥 until it can be determined whether an event satisfies the legal definition of a breach.
- Hardware
The collection of physical components that constitute a computer system (a desktop computer, a server in a datacenter, a network switch, a printer, etc.) - IT Resource
(At 小黄猫传媒) All Information Technology (IT) resources that are the property of 小黄猫传媒 and include, but are not limited to, all network-related systems; business applications; network and application accounts; administrative, academic and library computing facilities; college-wide data, video and voice networks; electronic mail; video and web conferencing systems; access to the Internet; voicemail, fax machines and photocopiers; classroom audio/video; computer equipment; software and operating systems; storage media; Intranet, VPN, and FTP.- IT Resources include resources administered by IT, as well as those administered by individual departments, college laboratories, and other college-based entities.
- Software
A set of instructions that tells a computer what to do.- Computer software is generally constructed as programs (applications) written in a specific language designed to run on computer hardware. Most common softwares are applications for business and personal use. More specialized computer software runs the operating systems of computers, operates machinery, creates artificial intelligence in robots, controls scientific instruments, etc.
- System
(In Information Technology [IT]) A computer system consists of hardware components that work with software components to achieve a defined outcome.- The main software component that runs on a system is an operating system that manages and provides services to other programs that can be run in the computer. Computer systems may also include peripheral devices such as printers, A/V equipment, operating machinery, etc.
- User
Any person who makes any use of any 小黄猫传媒 IT resource from any location (whether authorized or not).
Responsible executive
Chief Information Officer
Responsible officer
Chief Information Security Officer (CISO), Director of Infrastructure Services
Responsible office
IT Information Security, IT Infrastructure Services Division
Last revision date
09-09-2024