Topics Map > Policies
Topics Map > Security

Information Security Program - Sec. 2: Access, Security, and Control of Data and Information Policy

Purpose and Scope: The University of Wisconsin-Platteville maintains both paper records and computer information systems to carry out its educational mission. Federal and State laws and regulations govern access to these records. The University establishes local policies and procedures to ensure compliance with these laws and regulations and to protect the integrity of University records and the privacy of individuals. The following policy statements are applicable to all areas of the University and must be observed by all persons dealing with such information, including all University employees and students, as well as other individuals or entities that share University information for business purposes.
Policy and Principles
Data contained in the University's systems are the property of the University of Wisconsin-Platteville and represent official University records. Exceptions to this policy are: faculty developed curricular material, student developed curricular material, or certain licensed information such as electronic journal subscriptions. Questions regarding exemptions should be discussed with the University Legal Counsel.

Users who accept access to University data, regardless of the medium, also accept responsibility for adhering to certain principles in the use and protection of that data. These principles are:

1. Information systems within the University shall be used only for and contain only data necessary for fulfillment of the University's mission.

2. University data shall be used solely for the legitimate business of the University.

3. Due care shall be exercised to protect University data and information systems from unauthorized use, disclosure, alteration or destruction.

4. University data regardless of who collects or maintains it, shall be shared among those faculty or staff whose responsibilities require knowledge of such data.

5. Applicable federal and state laws and University policies and procedures concerning storage, retention, use, release, transportation and destruction of data and/or all information systems, content and components shall be observed.

6. Appropriate university procedures shall be followed in reporting any breach of security or compromise of safeguards.

7. University computerized information systems shall be constructed in such a manner to assure that:
a. Accuracy and completeness of all system contents are maintained during storage and processing;
b. Data, text and software stored and processed can be traced forward and backward for audit ability;
c. Information systems capabilities can be reestablished within an acceptable time due to loss or damage by accident, malfunction, breach of security or act of God; and
d. Actual or attempted breaches of security can be detected promptly.

8. Any faculty or staff member engaging in unauthorized use, disclosure, alteration or destruction of information systems or data in violation of this policy shall be subject to the appropriate disciplinary action, including possible dismissal and/or criminal prosecution.

9. Any student engaging in unauthorized use, disclosure, alteration or destruction of information systems or data in violation of this policy shall be subject to appropriate disciplinary action, including possible expulsion and/or criminal prosecution.

10. Users may not use, query, release or print data in any application which they have not been given deliberate access to, which can include but is not limited to:
a. Transcripts, grade reports, enrollment reports;
b. Financial Aid information;
c. Personnel, leave, salary reports;
d. Reports for government or funding agencies;
e. Fund-raising activities;
f. Mailing lists and labels; and
g. Private or public release of data to outside parties such as student, parents, and the news media.

11. All requests for information under the Freedom of Information Act, the Wisconsin Public Records Law, law enforcement agencies, subpoenas, etc. must be referred to the University Legal Counsel before releasing any records. Records will only be released at the direction of the University Legal Counsel.

Safeguarding of University information systems and data shall be the responsibility of each faculty, staff or student with knowledge of the system or data. Specific responsibilities are as follows:

  • Management - All levels of management are responsible for ensuring that system users within their area of accountability are aware of their responsibilities as defined in this policy. Specifically, managers are responsible for validating the access requirements of their staff according to their job functions prior to submitting requests for access, and for ensuring a secure office environment with regard to University information systems. Managers of major University offices should appoint an individual within their staff to ensure these responsibilities are observed. Managers are also responsible for ensuring that their staff attend appropriate training sessions offered by the University to ensure compliance with laws, regulations and local policies.
  • Employees - Faculty, staff, and student employees, are responsible for the protection, privacy, and control of all University data they access or create, regardless of the data storage medium. All employees must ensure that the data and data media are maintained and disposed of in a secure manner. All employees are responsible for understanding the meaning and purpose of the data to which they have access, and may use this data only to support the normal functions of the employees' administrative and academic duties. All employees are responsible for all transactions occurring under his/her userid and/or password. Passwords and userids may not be shared with anyone under any circumstances unless the Assistant Vice Chancellor for Information Services in consultation with the University Legal Counsel approves an exception.
  • Students - Students are responsible for protecting their userids and passwords so that no unauthorized persons would have access to their University records. Students are responsible for reading and understanding the Acceptable Use Policy, Email Policy, and Student Handbook, and complying with these policies and practices. Students should participate in University sponsored training sessions to improve their understanding of how to safeguard their own privacy.
  • The Assistant Vice Chancellor for Information Services is responsible for providing administrative, technical and educational support in the area of information security for all users of the information systems. This support may include but is not limited to: computer account management; system and network security administration; firewall management; and information security training programs.
Responsibility for Implementation
The Assistant Vice Chancellor for Information Services serves as the coordinator of the Information Security Program of the University of Wisconsin-Platteville.

Responsibility for Interpretation
The Assistant Vice Chancellor for Information Services will consult with the University Legal Counsel regarding interpretation of this policy. Final authority for interpretation rests with the University Legal Counsel.

Keywordsinformation, security, program, data, policy, control, access   Doc ID36093
OwnerLouann G.GroupUW Platteville
Created2013-12-17 15:40:20Updated2020-11-09 11:11:31
SitesUW Platteville
Feedback  0   0