Security Services

CWUP 2-70-010 Information Security and Privacy Roles and Responsibilities


(1) Policy

The Chief Information Security Officer (CISO) oversees the university information security and privacy activities through the implementation of an information security program that supports the principles of confidentiality, integrity, and availability for University institutional information. The security program is implemented in support of and according to the Information Services and Security strategic plan and CWUP 2-70-050 Information Security and Privacy Controls.

(2) Roles and Responsibilities

Various positions across the university have responsibility for information security and privacy.

(A) Security, Privacy, and Data, Advisory Council

The Security, Privacy, and Data, Advisory Council (SPDAC) provides institutional advisory services for information security and privacy to the Chief Information Security Officer and broad strategic guidance to support the university-wide information security program. The council is led by the Chief Information Security Officer and the Director of Institutional Effectiveness and reports up to the Enterprise Information Services Committee. The membership of the council is composed of staff representing key areas of the University. The responsibilities of the council include, but are not limited to:

  1. Advise, seek wide input, and recommend strategic direction to the Chief Information Security Officer on university-wide information security and privacy;
  2. Review and recommend university-wide information security and privacy policies, standards, guidelines, and operating procedures related to institutional information in any form (e.g. electronic or paper);
  3. Review and coordinate with the Chief Information Security Officer regarding privacy and compliance requirements related to information security and privacy laws and regulations that impart a duty upon the university;
  4. Review institutional risk issues and provide appropriate recommendations in support of the university's larger risk management programs and objectives;
  5. Serve as a point of contact for the Chief Information Security Officer as well as for the organizational area(s) for which they are responsible in matters related to information security and privacy; as well as
  6. All additional responsibilities outlined in the SPDAC charter.

(B) Data Owners

Data owners are executive leadership team level employees, with overall responsibility for the business results or the business use of the data within their delegations of authority (e.g. the Chief Financial Officer, Provost, or Vice President of Operations). The responsibilities of the data owners include:

  1. Overall responsibility and accountability for the data within their subject area domains; and
  2. Recommend policies, standards and guidelines regarding information security and privacy, business definitions of information, and the access and usage of that information, within their delegations of authority.

(C) Appointing Authorities

Appointing Authorities are assistant vice presidents, associate provosts, deans, executive directors and other individuals with delegated authority for an organizational area as provided in CWUP 2-10-170 Appointing Authority and Delegation of Authority. These individuals, or their designee(s), have the following information security and privacy responsibilities:

  1. As needed, develop, recommend, implement, and maintain policies, standards, or guidelines that are consistent with the university policies on information security and privacy, within the organizational area(s) for which they are responsible;
  2. Be accountable for risks, compliance obligations, and financial costs associated with university information security and privacy, including information security and privacy incidents and information security breaches, within the organizational area(s) for which they are responsible; and
  3. Follow the recommendations of the Chief Information Security Officer or designee, in connection with an information security and privacy incident investigation, and direct others to do so.

(D) Data Stewards

Data stewards are designated by and responsible to the appointing authority or designee (such as payroll, accounts payable, purchasing, or human resources business leads). Data stewards have knowledge of and work in accordance with numerous federal, state, and university rules and policies, including university policies on information security and privacy. The data steward role focuses on managing data content and the business logic behind all data transformations. The responsibilities of data stewards include:

  1. Help define, interpret, implement, and enforce federal, state, and university policies, standards, and guidelines for institutional information within their purview;
  2. Identify systems of record containing institutional information;
  3. Categorize institutional information within systems of record as public, restricted, or confidential, as defined in CWUP 2-70-020 Data Classification and Usagepolicy;
  4. Define usage and quality standards and guidelines for institutional information within their purview; and
  5. Develop and implement formal and auditable data access processes for institutional data under their stewardship.

(E) Data Custodians

Data custodians report to the Chief Information Officer (CIO) or Director of  Business Intelligence (BI), or their designee(s). The data custodians are responsible for the safe custody, transport, and storage of institutional data. The responsibilities of the data custodians include:

  1. Support and manage the day-to-day confidentiality, integrity, and availability of the information systems for which they are responsible;
  2. Document and disseminate administrative and operational procedures to ensure consistent storage, processing and transmission of data;
  3. Determine user access and obtain approval(s), as delegated;
  4. Make and be accountable for operational decisions about the use and management of an information systems in accordance with established business rules and policies; and
  5. Maintain critical information system documentation.

(F) Data User 

Data users are faculty, student employees, staff or third party vendors. Data users shall consult with and follow the applicable laws, regulations, and university rules, policies, standards and guidelines. Data users shall only access and use University information systems and institutional information to fulfill authorized job duties or activities for the university and in compliance with the Acceptable Use Policy CWUP 2-40-010.

Any agreements to provide a third party access to or use of institutional information shall ensure that such agreement is approved through the appropriate department. 

(3) Policy Maintenance

The Chief Information Security Officer shall review and recommend changes to this policy statement at least annually or more frequently as needed to respond to changes within the institution and the regulatory environment.

(4) Implementation

Failure by an individual to comply with the university policies on information security and privacy may result in disciplinary action up to and including termination for university employees, contract termination in the case of contractors or consultants, dismissal for interns and volunteers, or suspension or expulsion in the case of a student.

The university reserves the right to pursue appropriate legal actions to recover any financial losses suffered as the result of a violation of the university policies on information security and privacy.

 

[Responsibility: AVP of ISS; Authority: Cabinet/UPAC; Reviewed/Endorsed by: Cabinet/UPAC; Review/Effective Date: 6/4/2014; 02/03/2021; Approved by: A. James Wohlpart, President]

CWU News

CWU women’s rugby team earns six All-American selections

May 13, 2024

by

CWU Board of Trustees to Convene this week

May 13, 2024

by

More News