Author: Mattingly, Ashley

University IT Security Policies

The ITS Information Security Office has updated and added IT security policies that reflect current best practices. Below is a summary of the revised and new policies. You can view all IT security policies by going to security.uconn.edu and clicking “Policies, Standards & Guidelines.”

Revised Policies

Acceptable Use: Faculty, staff, and students should only use university IT equipment, systems, and services for university-related work and not for commercial or illegal activities. Individuals have a responsibility to protect their identity, data, and IT resources.

The sharing of accounts and/or passwords is disallowed. Systems should be properly maintained and patched to ensure security.

 

Data Classification Policy: Know the classification and requirements for handling various data types. Where appropriate, store your data on university managed databases and file storage systems. Protected and confidential data require additional levels of protection.

 

Data Roles and Responsibilities Policy: The roles and responsibilities of data stewards, data administrators, and data users are defined to ensure data is properly protected, used, and managed throughout its lifecycle.

 

Risk Management: Department and system owners are responsible for conducting a regular and ongoing risk assessment of the technology platforms they oversee.

 

Security Awareness Training Policy: Security awareness training is available to the UConn community, and the Information Security Office may mandate training for those who have access to confidential or protected information.

 

Use of Social Security Numbers: As systems are updated and replaced, Social Security Numbers should be used only as required.

 

New Policies

System and Application Security: Individuals responsible for operating or overseeing any University system or application are responsible for proper maintenance and oversight of systems and applications used by university constituents.

 

Mobile and Remote Device Security: Mobile or remote devices used to access any non-public IT resources owned or managed by the University must meet security requirements designed to reduce risk to University data and information systems.

 

Firewall Policy: Firewalls must be configured to maximize their protection and detection capabilities.