P300: Information Security Program Administration Policy
- Issued by:
- Office of the President
- October, 2016
Information Security Goals
Pursuant to federal and state laws and SUNY policy, Stony Brook University (SBU) must maintain an effective and comprehensive information security program ( Program ) that addresses the full range of information security issues that affect the University. The Program will implement an Information Security Program according to industry standards. In so doing, the Program will:
- Lead and assist the workforce in preserving the confidentiality, integrity, and availability of Sensitive Information;
- Give special attention to preserving the confidentiality of information that bears directly on the privacy, health, and property rights of persons with whom SBU has business transactions, including students, employees, alumni, applicants, patients, contractors, vendors, and customers;
- Lead and assist the workforce in protecting Sensitive Systems; and
- Engage all employees, as appropriate to their roles, in actively anticipating and addressing threats and hazards to the security of Sensitive Information and Sensitive Systems.
Responsibility for Information Security
Pursuant to industry standards, the University’s senior leadership must:
- Oversee the Program's implementation;
- Identify, authorize, and require specific individuals to implement the Program; and
- Ensure individual managers are assigned ownership and stewardship responsibilities for critical information assets.
All employees, as appropriate to their jobs, must treat Sensitive Information and Sensitive Systems in accordance with the principles and procedures established by the Program .
All supervisors must implement and monitor procedures, as appropriate to their business units’ work, to support and encourage the proper treatment of Sensitive Information and Sensitive Systems.
The Information Security Program Council (ISPC) has been identified and authorized to implement the Program and publish related policy, procedure and standards. Individual membership will be maintained in a separate document.
Set of Information Security Policies
Stony Brook University must maintain a comprehensive set of information security policies governed by the Program. Additionally, Stony Brook University will promulgate to appropriate audiences each of the policies in this set and educate workers regarding the content and intent of the policies.
Waivers and Exceptions
Any waiver of requirements set forth in these policies must be established through formal procedures, documented by the Information Security Program Council (ISPC) , which justifies the waiver based on risk and business value and define either an acceptable period for expiration of the waiver or process for renewal consideration.
(Note: Not all terms defined in this policy are used herein but may be used in other related policies)
Access – Relating to information: to view, read, decrypt, share, speak aloud, listen to, create, collect, store, move, copy, transmit, or delete. Relating to objects, such as Sensitive Systems: to touch, log into, modify, configure, move, remove, steal, destroy.
Active – Relating to information: having authorization to access or modify information. Relating to objects, such as Sensitive Systems: having authorization to access or modify the system configuration or operating system.
Approved – Relating to information and system security procedures: written in the University’s policies or procedures, or accepted by management through precedent and long-standing, operationally required practice, where such practice does not conflict with written policy and procedure.
Authorization – Formal permission provided to an individual with the knowledge and approval of the director of a department that is authorized to give such permission.
Breach Notification – The procedures to notify persons that their personal information was or might have been acquired by a person without authorization. Such procedures are legally required by many jurisdictions including New York State.
Container – Relating to information: a structure that can hold a physical or digital representation of information (i.e., data), such as a computer, database, computer folder, building, room, paper file cabinet.
Department – A University functional office.
Departmental SI Declaration – A chart maintained by a SI Department that shows which SI Categories are active in which of its business functions.
Departmental Workforce Inventory – A chart maintained by a department that shows which workers, if any, are active with which SI Categories.
Information Security Program – A formal management function, with written goals and charges, that seeks to address the full range of information security issues that affect the organization and seeks to align its practices with applicable laws, regulations, policies, and standards of practice.
Information Security Program Council (ISPC) – the people and associated procedures that administer the Program.
Modify – As related to information: to alter, encrypt, distort, deface, delete, hide or otherwise block access.
Personally Issued Technology (Technology) – The University’s information and communication technology as it is issued (assigned or made available) to individuals for conducting the University’s business.
Program – The Stony Brook University Information Security Program, which includes efforts put forth by the ISPC and efforts employed by Stony Brook Medicine, FSA, Research Foundation, SBF, and the Computer Science Department.
Program Document – a formal, published document maintained and used by the Program.
Program Library – a formal location for Program Documents.
Public Information – SE Information that is presented in an approved medium that intentionally enables the public to access it, although usually not to modify it.
SE Information – SUNY Entity information. Information created or collected through a function of the University.
SE System – SUNY Entity system. A computer- or network-based system, including applications and databases, operationally managed by a University function.
Sensitive Information (SI) – SE Information subject to security controls overseen by the Program.
Sensitive Information Department (SI Department) – a department that is active with one or more SI Category.
Sensitive Information Category (SI Category) – category of Sensitive Information defined in policy using operational details meaningful to the University’s operations in order to assist managers in identifying instances of the information.
Sensitive Information Worker (SI Worker) – an employee that is active with SI.
Sensitive System (SS) – SE system subject to security controls overseen by the Program.
Sensitive System Category (SS Category) – category of Sensitive System defined in procedure using operational details meaningful to the University’s operations in order to assist managers in identifying instances of such systems.
Sensitive System Worker (SS Worker) – an employee that is active with SS.
User – anyone, whether an employee or not, who has been granted permission to use the University’s Personally Issued Technology (Technology).
Virtual – as related to digital structures (images, files, and containers): as presented or simulated for an audience, consumer, user, etc., regardless of the underlying construction.
Specific questions concerning information security or this policy should be referred to:
Information Security Program Council (ISPC)
For more information regarding cybersecurity and safe computing practices