Saint Joseph’s College has established this WISP (Written Information Security Policy) for the protection of data related to all the college’s business. This WISP sets forth guidelines for methods of accessing, collecting, storing, using, transmitting and protecting Personally Identifiable Information. It also outlines the need for compliance with both state and federal regulations.
In formulating this WISP, Saint Joseph’s College seeks to:
This policy applies to all Saint Joseph’s College employees, full-time or part-time including faculty, administrative staff, contract and temporary workers, hired consultants, interns and student employees, as well as all other members of the Saint Joseph’s College community. This policy also applies to certain contracted 3rd party vendors. The data covered by this policy includes any information created, stored, accessed or collected at the College or for College operations. The WISP is not intended to supercede any policy, document or procedure that contains more specific requirements, or exceptionally secured procedures that safeguard data.
WISP – The term WISP refers to Saint Joseph’s College Written Information Security Policy.
PII – The term PII refers to Personal Identifiable Information. PII encompases any and all data held by Saint Joseph’s college, either written or electronic. Maine State law defines PII by Title 33: Property, Chapter 11: Register of Deeds, subchapter 2: Records and Record Keeping, 651-B. Privacy Protection:
“Personal information” means an individual’s first name or first initial and last name in combination with any one or more of the data elements described in this paragraph:
(1) Social security number;
(2) Driver’s license number or state identification card number;
(3) Account number, credit card number or debit card number if circumstances exist such that the number could be used without additional identifying information, access codes or passwords;
(4) Account passwords or personal identification numbers or other access codes; or
(5) Any of the data elements contained in subparagraphs (1) to (4) when not in connection with the individual’s first name, or first initial, and last name if the information included would be sufficient to permit a person to fraudulently assume or attempt to assume the identity of the person whose information was included.
Data – For the purposes of this document, data refers to information stored, accessed or collected at the College about members of the College community.
Data Custodian (President and VP’s) – A data custodian is responsible for maintaining the technology infrastructure that supports access to the data, safe custody, transport and storage of the data and provide technical support for its use. A data custodian is also responsible for implementation of the business rules established by the data steward.
Data Steward – A data steward is responsible for the data content and development of associated business rules, including authorizing access to the data. The steward will be responsible for these assigned groups:
Faculty – Vice President and Chief Learning Officer;
Staff – Vice President and Chief Financial Officer;
Student – Registrar, and Senior Director for Student Success Initiatives;
Alumnae – Vice President & Chief Advancement Officer
Data Security Coordination Team – SJC IT personnel charged with managing the written security policy, ensuring the training of employees for WISP compliance, and appropriate testing and annual review of the WISP. Led by the Associate VP and Chief Information Officer and consisting of the Information Security Officer and the Director of IT Infrastructure.
Personal Information – described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI),as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Breach – A “breach” shall mean the unauthorized acquisition or unauthorized use of either unencrypted PII or, encrypted electronic PII along with the confidential decryption process or key that is capable of compromising the security, confidentiality, or integrity of PII maintained by the College, creating a substantial risk of identity theft or fraud.
A good faith but unauthorized acquisition of PII by a person, for the lawful purposes of such person, is not a breach unless the PII is used in an unauthorized manner or subject to further unauthorized disclosure.
A “breach” shall not include disclosure of PII which is legally accessible from an outside legitimate source, or where disclosure is required by court order or where necessary to comply with state or federal regulations.
Commitment to Limited Collection of, and Access to, PII
Saint Joseph’s College will collect, maintain and store only that PII which is reasonably necessary to accomplish the legitimate business purpose for which it is collected; limiting the time PII is retained to what is reasonably necessary to accomplish such purpose; and limiting access to those persons who are reasonably required to have access to PII in order to accomplish such purpose or to comply with state or federal record retention requirements. All persons granted access to PII shall be informed of Saint Joseph’s College’s Written Information Security Policy and shall be provided basic training for compliance with its requirements.
Identified Locations of PII
Saint Joseph’s College will identify specific electronic databases and servers, along with physical locations, where PII is known to exist. These locations, while not an exhaustive list, are kept by the Data Custodians and are audited by the Information Security Officer. It is incumbent upon the Data Stewards in each department, to promulgate amongst their staff with PII access, any and all identified locations of PII they have access to, and the importance of preserving its confidential nature.
Identified Potential Risks to PII Security
1) Internal
2) External
3) Electronic Data Safeguards
Vendor assigned and default passwords shall be changed reasonably promptly, but must be changed before the system accessed through said password contains any PII.
Access to PII shall be electronically limited to those employees with unique usernames. Usernames and passwords with access to PII shall not be shared amongst individuals.
For the purposes of this section, a job description, approved by the appropriate Data Custodian, that necessitates electronic access to share locations which are designated to contain PII, shall constitute written permission.
Network Design Considerations: Saint Joseph’s College shall maintain its firewall so that networks which contain data servers can be discrete from end-user systems.
Data Encryption: Where electronic files containing PII must unavoidably be taken from an approved storage location and placed on portable media (including, but not limited to, a computer’s internal hard drives, USB “thumb drives,” externally connected drives and other removable media such as CD Rom), the files containing PII must comply with the standards set in the Saint Joseph’s College Data Classification Guideline.
Encrypted Network Transmission: Where feasible, when PII is transmitted over a data network where data interception is reasonably foreseeable, PII will be encrypted using Saint Joseph’s College approved encryption.
Saint Joseph’s College shall maintain SSL Certificates, managed by a trusted root host, which shall be used on web pages served by the College over which there exists the reasonably foreseeable possibility that PII may be accessed.
VPN: Saint Joseph’s College shall maintain a Virtual Private Network (“VPN”), which will necessarily be used to encrypt data connections to the College where there is a reasonably foreseeable possibility that PII will be carried over the connection and an SSL HTTP connection is not feasible.
Security Patches: There shall be reasonably up-to-date versions of virus/malware protective agents running on College-owned computers, which report back to a central server that is reviewed regularly for compliance with policy. Reasonable means and methods shall be taken to ensure that security-related critical patches are applied to operating systems and application software.
Electronic File Storage: The College shall maintain a file server or other secure means of data storage of sufficient speed and storage capacity to hold any and all electronic documents that may contain PII. No PII should be stored on individual desktop/laptop computers. All data must comply with Saint Joseph’s College Data Classification Guideline.
Encrypted Backups: Wherever feasible, server backups shall be encrypted using an industry-accepted data encryption standard.
Ongoing Data Security Training and Acceptable Use: The College shall develop and maintain a data security employee training program. Employees whose positions at the College require contact with PII shall be provided additional training, within their departments, commensurate with the potential exposure.
The College will maintain an acceptable use policy with which all persons granted access to Saint Joseph’s College’s network will be required to comply.
4) Data Retention and Destruction
5) Paper Based Data Safeguards
6) Third Party Entrustment
7) Termination of the Relationship that Requires Entrustment of PII
Employees may leave, be terminated, or switch roles within Saint Joseph’s College. The relationship between Saint Joseph’s College and third parties may change. Where the employee or third-party had access to specific PII and the changed relationship negates the need for access, Saint Joseph’s College shall take specific affirmative steps to ensure that access to PII is withdrawn.
8) Disciplinary Actions for Violations of the WISP
Employees must comply with the requirements of the WISP. Use of PII in a manner not expressly or impliedly granted by the College is prohibited during, and subsequent to, employment at Saint Joseph’s College. Disciplinary action for infractions of the WISP shall be mandatory, the severity of which shall be commensurate to the infraction and may depend on a number of factors, including but not limited to, the nature of the violation, the nature of the PII, and the extent of the unauthorized use, exposure, or disclosure.
9) Breach Procedures
Whenever there is a breach that requires notification under Maine Law, Title 10, 1347-A, the College shall take, at a minimum, the following steps: