Procedure Statement
East Texas A&M University's electronic information resources are vital academic and administrative assets that require appropriate safeguards. Computer systems, networks, and data are vulnerable to a variety of threats. These threats have the potential to compromise the integrity, availability, and confidentiality of the information.
Reason for Procedure
This procedure provides guidance for the management and oversight for information security processes.
Procedures and Responsibilities
For all campus users
Acceptable Use Acceptable use of university computing resources
Authorized Software Standards for licensed software use
Email Usage Standards for ensuring prudent and acceptable use of email
Internet/Intranet Usage Acceptable use of university network resources
Malicious Code Detection and blocking of viruses and spyware
Network Access Standards for access and use of network infrastructure
Password Authentication Standards for complexity of passwords and management
Portable Computing Standards for storage of confidential data stored on mobile computing devices
Privacy Coveys the limits and expectations of privacy
For network administrators
Network Configuration Standards for maintenance, expansion, and use of network infrastructure
For system administrators
Account Management Standards for administration of user accounts
Administrator/Special Access Standards for administration of special access privilege accounts
Backup/Recovery Standards for backup and recovery of systems containing essential data
Change Management Procedures for modifications of systems containing essential data
Incident Management Describes prevention, detection, and response to security incidents
Intrusion Detection Management of the detection of attempts to bypass security
Physical Access Management of access to information infrastructure
Security Monitoring Ensures security controls are in place and effective
Server Hardening Ensures server controls are configured to protect confidential information
Vendor Access Require non-university employee to sign non-disclosure form prior to access
For system developers
System Development Process ensuring accurate and efficient system acquisition and/or development
Related Statutes, Policies, and Requirements
System Policy 29.01 Information Resources
System Regulation 29.01.03 Electronic Information Services Access and Security
University Procedure 29.01.03.R0.01 Information Security Standards Portable Computing
Supersedes:
University Rule 24.99.99.R1 Electronic Information Security
University Procedure 24.99.99.R1.01 Electronic Information Security Standards
Definitions
Confidential Information - Information that is excluded from disclosure requirements under the provisions of the Texas Public Information Act or other applicable state or federal laws. Most student records are confidential records.
Mission Critical Information - Information that is defined by East Texas A&M University or any division thereof (department, etc.) to be essential to their function(s) and would cause severe detrimental impact if the data/system were lost and unable to be restored in a timely fashion.
Owner - A person responsible for a university function and for determining controls and access to electronic information resources supporting that university function.
Custodian - A person (or department) providing operational support for an information system and having responsibility for implementing owner-defined controls and access privileges.
ISAAC (Information Security Awareness Assessment and Compliance) - A web-based system used to assess the security posture of information systems and measure compliance with the Information Security Standards. It also provides guides for creating a disaster recovery plan and performing a physical security check. Additionally, a security training course (information and test) is provided.
Contact Office
Chief Information Officer, 903.886.5550