Information Security Policy
Purpose
This Information Security Policy outlines the university’s obligations to protect the confidentiality, integrity, and availability of the information that is stored on, processed by, or transmitted through university-provided Information Technology Resources (ITRs), as defined in the Appendix.
Scope
This policy applies to all university-provided ITRs.
Policy
Data Classification Policy Linkage
This policy is directly linked to the Data Classification Policy. This policy and all associated standards key off the Data Classification Levels – Restricted, Sensitive, or Public, as defined by the Data Classification Policy, of the ITRs in question.
Risk Assessment
All ITRs will be handled in accordance with the Risk Assessment Policy.
Awareness and Training
Annual security awareness training will be provided to all faculty and staff.
Incident Response
Any incidents that threaten the confidentiality, integrity, or availability of ITRs will be handled in accordance with the Incident Response Plan. The Incident Response Plan is not a public document. Wesleyan faculty and staff can request a copy of the Incident Response Plan from the Chief Information Security Officer.
Configuration Management
All ITRs listed in the Configuration Management Table in the Appendix will be configured in accordance with the applicable standard listed in the Configuration Management Table.
Encryption
All ITRs classified as either Restricted or Sensitive will be handled in accordance with the Encryption Standard.
Passwords
All service accounts used to access ITRs classified as either Restricted or Sensitive will be created in accordance with the Password Standard.
Cameras
All networked cameras on campus will adhere to the Networked Camera Policy.
Badge Access Control
All access control devices that read university identification cards will adhere to the Badge Access Control Policy.
Vulnerability Management
All ITRs classified as either Restricted or Sensitive will be regularly scanned for vulnerabilities in accordance with the Vulnerability Management Policy. Any confirmed vulnerabilities will be addressed in accordance with the Vulnerability Management Policy.
Exceptions
All exceptions to this policy require written approval from the Chief Information Security Officer. All exceptions require annual renewal.
Appendix
Configuration Management Table
ITR type |
Configuration Standard |
Workstation |
|
Server |
|
Network Equipment |
|
Internet of Things (IoT) device |
|
Operational Technology (OT) |
|
Networked Camera |
Included in the Networked Camera Configuration Policy |
Definitions and Terms
Information Technology Resources (ITRs) – This includes, but is not limited to, end-user computing devices, services, networks, email, software, printers, scanners, video distribution systems, telephone systems, fax systems, and other computer hardware and software, whether owned by the university or contracted by the university from a third party.
Revision History
August 2024 – Policy adopted