|POLICY TITLE:||Information Security Policy|
|DATE OF ISSUANCE:||This policy was approved by the President's Council on December 17, 2008. Nominal administrative changes were made July 2018.|
|RESPONSIBLE DEPARTMENT/UNIT:||Office of the Vice President for Operations. Questions about this policy should be directed to the Information Security Office, ext. 8-8556.|
Carnegie Mellon University ("University") has adopted the following Information Security Policy ("Policy") as a measure to protect the confidentiality, integrity and availability of Institutional Data as well as any Information Systems that store, process or transmit Institutional Data.
This Policy applies to all faculty, staff and third-party Agents of the University as well as any other University affiliate, including students, who are authorized to access Institutional Data.
This Policy will be reviewed by the University's Information Security Office every 5 years or as deemed appropriate based on changes in technology or regulatory requirements.
Violations of this Policy may result in suspension or loss of the violator's use privileges, with respect to Institutional Data and University owned Information Systems. Additional administrative sanctions may apply up to and including termination of employment or contractor status with the University. Civil, criminal and equitable remedies may apply.
Exceptions to this Policy must be approved by the Information Security Office and formally documented. Policy exceptions will be reviewed on a periodic basis for appropriateness.
Agent, for the purpose of this Policy, is defined as any third-party that has been contracted by the University to provide a set of services and who stores, processes or transmits Institutional Data as part of those services.
Information System is defined as any electronic system that stores, processes, or transmits information.
Institutional Data is defined as any data that is owned or licensed by the University.
|01||Throughout its lifecycle, all Institutional Data shall be protected in a manner that is considered reasonable and appropriate, as defined in documentation approved and maintained by the Information Security Office, given the level of sensitivity, value and criticality that the Institutional Data has to the University.|
|02||Any Information System that stores, processes or transmits Institutional Data shall be secured in a manner that is considered reasonable and appropriate, as defined in documentation approved and maintained by the Information Security Office, given the level of sensitivity, value and criticality that the Institutional Data has to the University.|
|03||Individuals who are authorized to access Institutional Data shall adhere to the appropriate Roles and Responsibilities, as defined in documentation approved and maintained by the Information Security Office.|