This document outlines the University of Southern Indiana’s (USI) information security requirements for all employees. It is USI’s policy to provide a security framework that will protect information assets from unauthorized access, loss or damage, or alteration while maintaining the university academic culture. USI management is committed to these security policies to protect information utilized by USI in achieving its mission.
All employees, contractors, vendors and third parties that use, maintain or handle USI information assets must follow this policy. This policy includes governance of hardware, software, data, facilities, and information systems including paper media. Policy exceptions will be permitted only if approved in advance and in writing by the Chief Information Officer (CIO) and are reviewed annually.
All Users
Each user of USI computing and information resources must realize the fundamental importance of information resources and recognize their responsibility for the safekeeping of those resources. Users must guard against abuses that disrupt or threaten the viability of all systems. The following are specific responsibilities of all USI information system users:
Human Resources
Due to their direct and constant relationship with existing employees, as well as their unique position of having the first and last interactions with new/terminated employees, the Human Resources Department has an important role with regard to USI information security. The following items are the ongoing responsibility of the Human Resources Department:
Executive Administration
Due to their leadership requirements vice presidents, provosts, and other individuals with delegated executive authority have an important role with regard to USI information security. The following items are their ongoing responsibility:
Directors/Deans/Chairs
Due to their direct reporting relationship with their department employees, directors/deans have an important role with regard to USI information security. The following items are their ongoing responsibility:
Information Technology
The CIO is responsible for coordinating and overseeing compliance with policies and procedures regarding the confidentiality, integrity and security of University information assets.
The CISO works with IT staff and end users to develop security policies, standards and procedures to help protect the information assets of USI. This role is dedicated to developing, implementing, and overseeing the IT security policy and framework, and providing education and awareness.
Specific responsibilities include:
USI System and Network Administrators are the direct link between information security policies and the network, systems and data. System and Network Administrator responsibilities include:
All data stored and accessed on USI information systems, whether managed by employees or by a third party, must follow this policy. Data stored on USI computing resources must be assigned a classification level. This level is used to determine user access, data storage and protection, data handling, data retention and destruction. Data classification is defined in four categories. In the absence of being formally classified, institutional data should be treated as Internal Use by default:
Listed from most sensitive to least sensitive
Any public records access requests must be coordinated through Government and Legal Affairs.
IT security change control is the formal process for making changes to IT systems that impact the existing security configuration, such as changes to the perimeter firewall, router rules, changes to server firewall rules and access control, changes to security monitoring systems, and introduction of new systems and applications into the environment. All changes are tracked and reported to IT management. Change control documentation includes:
Electronic or hardcopy media are to be physically retained, stored or archived only within secure USI office environments, or offsite secured records management facilities. Data, regardless of storage location, is retained only as long as required for legal, regulatory (including federal, state, and professional), accreditation and university requirements. The specific retention length is managed by the data creator or department. Each department is responsible for establishing appropriate records management practices. The following is a guideline maximum length of record retention time:
When no longer needed for legal, regulatory (including federal, state, and professional), or business requirements, data must be removed from USI systems using an approved method:
System Configuration
All servers and network devices on USI networks, whether managed by employees or by third parties, must be built and deployed in accordance with this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
Firewall and Router Security Administration
All server firewalls and all network firewalls and routers on USI networks, whether managed by employees or by third parties, must follow this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
System Administrator Responsibilities
Software Development
All development efforts of software designed to run on USI Enterprise Resource Planning (ERP) computing systems, whether managed by employees or by third parties, must follow this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
ERP systems have a test/development environment, separate from the production environment, used to test all new software. If the test environment has connectivity with the production USI network, access controls must be in place to enforce the separation. If the test system uses data copied from production systems, then the same data and systems security enforced on the production system must be enforced on the test system.
Managed Detection and Response (MDR)
IT Security with support from the MDR provider and the Student Security Operations Center (SOC) is charged with protecting the University’s electronic information assets, including performing ongoing, routine network security monitoring and using technologies to detect and/or prevent network intrusion.
IT Security may use the following monitoring technologies on the USI network:
Vulnerability Management
All servers and network devices on USI networks, whether managed by employees or by third parties, must be built and deployed in accordance with this policy. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
Critical servers and network devices are routinely scanned for known published vulnerabilities. Identified vulnerabilities are reviewed weekly for significance and are appropriately applied (as defined in the USI IT Change Management procedure). Designated industry websites are reviewed weekly for security advisories.
This policy documents encryption standards that must be used on all applicable mechanisms and systems on USI networks, whether managed by employees or by third parties.
Encryption is required for all laptops, workstations, and any information system that may be used to store or access critical and restricted information. Portable drives may only be used to store or access critical and restricted information if an approved encryption solution is available.
Critical and restricted information must be encrypted during transmission over networks in which it is easy and common for the data to be intercepted, modified or diverted (such as the Internet, wireless network, GSM, and GPRS). Some examples of strong encryption that is acceptable are:
The encryption technology used must only accept trusted keys and/or certificates, use secure configuration and not use insecure versions. The encryption strength must be strong and based on vendor recommendations or industry best practices. Any exceptions must be authorized by CIO/CISO.
This policy applies to the physical security of the university’s information systems. Campus and Data Center Security controls include:
For all third parties with whom critical and restricted data is shared (e.g., back-up tape storage facilities, managed service providers such as Web hosting companies or security service providers, or those that receive data for fraud modeling purposes), the following must be done:
Email is an enterprise tool for improving education and administrative efficiency and to enable internal and external communications. It serves as a primary means of communication from the University System and its component institutions to all community members. All users of the USI email system are encouraged to protect the privacy of their personal information by retaining a clear separation between institutional/academic email and personal email by using a separate, non-USI email account for conducting personal business. Data classified as critical or restricted is never to be sent through the public Internet using unsecured end-user messaging technologies such as e-mail, instant messaging, or chat. Data classified as critical or restricted may only be transmitted via e-mail if secured by University approved encryption technology. Any exceptions must be authorized by CIO/CISO.
See Data Communication and Computer Use policy for additional email use details.
This policy applies to the network access and authentication of the university’s information systems. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
User Access
Every user is provided a unique user account and must maintain a personal secret password. Multi factor authentication (MFA) is deployed for remote and web-based access to USI information systems and networks. Systems requiring the use of MFA include, but are not limited to, virtual private network (VPN), systems utilizing Single Sign-On (SSO), system administration tools, and privileged domain accounts. Employee user accounts are originated via Human Resources. Student user accounts are generated via the application process. Any user account requested outside this process requires CIO/CISO review and approval.
The use of non-authenticated (e.g. no password) user accounts is prohibited. User accounts not associated with a single identified user, such as a shared or group user account, are generally prohibited. Exceptions to user accounts associated with a single identified user must be evaluated, documented, and approved by CIO/CISO.
Each user’s access privileges must be: authorized according to business needs, restricted to least privileges necessary to perform job responsibilities and assigned based on job classification and function. Departments requesting specific privileges complete an IT Resources request form. Requests for user account with system administration rights requires CIO/CISO review and approval.
Users accessing USI systems remotely: before establishing a connection the user must ensure the remote device is up-to-date on patches and is running a current anti-virus program. Once connected user must never copy or download data classified as Critical or Restricted to an unencrypted remote device.
Desktop Administrator Access
Under certain circumstances, Desktop Administrator Access may be issued to employees on either a temporary or ongoing basis to perform tasks within the scope of their employment. USI recognizes that issuing Desktop Administrator Access to computers introduces an increased risk to the security of its systems and data. Therefore, requests for ongoing Desktop Administrator Access must be accompanied by an approved authorization from the employee’s department head or dean and the CIO.
The use of these rights and the level of access to the computer are to be in accordance with USI’s Acceptable Use Policy. Desktop Administrator Access will only be granted on a very limited basis and only when absolutely necessary. Desktop Administrator Access will not be granted primarily for reasons of employee convenience.
Annual administrator access recertification process is coordinated by IT Security. A review of service accounts that are used as database application IDs must be included to verify that the service accounts can only be used by the applications and not by individual users or other processes.
Vendor and Guest Access
Vendor or Guest access is provided as needed to any person who demonstrates a reasonable business need to access the network. Guests and Vendors must agree to and sign the USI Acceptable Use Policy before access is granted. Vendor accounts used for remote maintenance must only be enabled during the time that access is needed and monitored while being used. Vendor and Guest accounts must be disabled at the end of the noted term. Extensions must be requested through CIO/CISO.
System Administrator Responsibilities
The System Administrator has the following responsibilities regarding user account and access management. Exemptions from this policy will be permitted only if approved in advance and in writing by the CIO.
The identity theft red flags program is designed to provide information to assist individuals in 1) detecting, preventing, and mitigating identity theft in connection with the opening of a “covered account” or any existing “covered account” or who believe that a security incident has occurred and 2) reporting a security incident. This program was developed pursuant to the Fair and Accurate Credit Transactions Act of 2003 and the Federal Trade Commission’s Red Flags Rule, which require creditors to adopt policies and procedures to prevent identity theft.
Covered accounts maintained by the University of Southern Indiana include:
Identification of Red Flags
Broad categories of “Red Flags” include the following:
Detection of Red Flags
Detection of Red Flags in connection with the opening of covered accounts as well as existing covered accounts can be made through such methods as:
An information security incident that results in unauthorized access to a customer’s account record or a notice that a customer has provided information related to a covered account to someone fraudulently claiming to represent USI or to a fraudulent web site may heighten the risk of identity theft and should be considered Red Flags.
Response to a Red Flag
Any suspected Red Flag detection needs to be reported to CIO/CISO for support in the Information Security Incident Response Process. Based on the type of red flag, the appropriate IT Security team member will work with the employee and Public Safety to determine the appropriate response.
Security Incident Reporting
Any employee who believes that a security incident has occurred must immediately report the suspicious activity to the IT Help Desk.
Service Providers
USI remains responsible for compliance with the Red Flag Rules even if it outsources operations to a third-party service provider. The written agreement with the third-party service provider shall require the third-party to have reasonable policies and procedures designed to detect relevant Red Flags that may arise in the performance of their service provider’s activities, including notification to USI if a Red Flag is detected and the steps implemented to prevent or mitigate additional identify theft.
Training
All employees who process any information related to a covered account shall receive training on procedures as outlined in this document. Additionally, refresher training may be provided annually.
Red Flag Definitions
Covered Account - A consumer account designed to permit multiple payments or transactions. These are accounts where payments are deferred and made by a borrower periodically over time such as a tuition or fee installment payment plan.
Creditor - A person or entity that regularly extends, renews, or continues credit and any person or entity that regularly arranges for the extension, renewal, or continuation of credit.
Identity Theft – A fraud committed or attempted using the identifying information of another person without authority.
Red Flag - A pattern, practice or specific activity that indicates the possible existence of identity theft.
Security Incident - A collection of related activities or events which provide evidence that personal information could have been acquired by an unauthorized person.
An effective incident response process helps ensure the secure operation of USI's Information Technology Resources, minimizes the negative consequences of Information Security Incidents, and improves the university’s ability to promptly restore operations affected by such Information Security Incidents. It further ensures Information Security Incidents are promptly reported to the appropriate officials, and that they are consistently and adequately managed.
A security incident may come in many forms: a malicious attacker gaining access to the network, a virus or other malware infecting computers, or even a stolen laptop containing restricted or critical data. The Information Security Incident Response Process (ISIRP) is a series of steps taken from the point of problem identification up to and including, final resolution and closure of a security incident. The process also contains information required to inform appropriate parties of the detection, problem status, and final resolution of the event.
All employees have the responsibility to assist in the incident response process within their particular areas of responsibility. The scope of this policy covers all information assets owned or provided by the university, whether they reside on the network or elsewhere.
The ISIRP communicates the flow of information and provides action guidelines for management, technical staff, employees, and students to follow regarding the notification and resolution of an IT security incident. IT Security maintains the program and questions can be directed to the CIO/CISO.
Roles and Responsibilities
|
Individual or Team |
Role and Responsibilities |
|
Employee |
Aware of potential IT security incidents and report suspicious activity to the IT Service Desk |
|
IT Service Desk |
Receive initial report of a problem and gather relevant information |
|
CIO or CISO |
Single point of contact for status updates |
|
IT Department |
Analyze initial report and follow procedures to coordinate with CIO and IS, system administrator, or third-party vendor to provide forensic support as needed and fix and restore service to normal |
|
Security Team |
Make leadership and management decisions or escalate to executive management regarding IT security incident and assist with determining appropriate course of action |
Contact List
|
Contact |
Primary |
Backup |
|
Help Desk |
812-465-1080 |
N/A |
|
CIO |
Austin Siders 812-465-1733 |
Stacy Draper 812-465-1063 |
|
CISO |
Stacy Draper 812-465-1063 |
Austin Siders 812-465-1733 |
|
Security Team |
Austin Siders 812-465-1733 |
Primary: Steve Bridges, Brad Will, Dave Alexander, and Lance Woods Contact Risk Management (Jeff Sponn) for Cyber Insurance support Secondary: Data Governance Strategic Team Members, and Public Relations |
Revision History
|
Revision # |
Description |
Approval |
Date |
|
1.0 |
New policy |
S. Draper- Author; IT Security Team and S. Bridges- Approved |
7/31/17 |
|
1.1 |
Red Flags Addition |
S. Draper- Author; IT Security Team and S. Bridges- Approved |
6/15/18 |
|
1.2 |
MFA, MDR Addition and General Edits |
S. Draper – Author IT Security Team and S. Bridges - Approved |
1/14/22 |
|
1.3 |
CIO Resource Addition and General Edits |
S. Draper – Author IT Security Team and S. Bridges - Approved |
2/28/23 |
|
1.4 |
Enhanced ISIR and General Edits |
S. Draper – Author IT Security Team and S. Bridges - Approved |
6/7/24 |
|
1.5 |
Revised Email, Vendor Management, and ISIR Sections |
S. Draper - Author IT Security Team and S. Bridges - Approved |
4/30/25 |