Written Information Security Plan
The purpose of the plan is to:
- Ensure the security and confidentiality of personal information;
- Protect against any anticipated threats or hazards to the security or integrity of such information;
- Protect against unauthorized access to or use of such information in a manner that creates a substantial risk of identity theft or fraud.
The University’s objective, in the development and implementation of this comprehensive Written Information Security Plan (“WISP” or “Plan”), is to create effective administrative, technical and physical safeguards for the protection of personal information of Faculty, Staff, Students, Alumni and customers and residents of the Commonwealth of Massachusetts, and to comply with our obligations under 201 CMR 17.00. The Plan sets forth our procedure for evaluating our electronic and physical methods of accessing, collecting, storing, using, transmitting, and protecting personal information of residents of the Commonwealth of Massachusetts. For purposes of this Plan, “personal information” means a Massachusetts resident's first name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account; provided, however, that “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.
Written Information Security Plan
In formulating and implementing the Plan, we will
- Identify reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information;
- Assess the likelihood and potential damage of these threats, taking into consideration the sensitivity of the personal information;
- Evaluate the sufficiency of existing policies, procedures, customer information systems, and other safeguards in place to control risks; identify existing policies and procedures that serve as resources for WPI to further enhance and comply with security issues, e.g.
- Network Security Policy
- WPI Campus Code of Conduct
- Data Security Policy
- Data Access Policy
- Acceptable Use Policy
- Code of Conduct for IT Administrators
- WPI FERPA Compliance Statement
- Design and implement a plan that puts safeguards in place to minimize those risks, consistent with the requirements of 201 CMR 17.00; and
- Regularly monitor the effectiveness of those safeguards: The University data security program includes the policies, practices and procedures spelled out in latest version of the WPI Network Security Policy.
1.0 Data Security Manager
The University has identified the combined efforts of the Risk and Compliance Office, along with the Data Access Working Group, as the Data Security Managers with the following responsibilities:
- Initial implementation of the Plan;
- Regular testing of the Plan’s safeguards;
- Evaluating the ability of service providers to comply with 201 CMR 17.00 in the handling of personal information for which we are responsible, ensuring there are included in our contracts with those services providers provisions obligating them to comply with 201 CMR 17.00 in providing the contracted for services, and obtaining from such service providers written certification that such service provider has a written, comprehensive information security program that is in compliance with the provisions of 201 CMR 17.00.
- Reviewing the scope of the security measures in the Plan at least annually, or whenever there is a material change in our business practices that may implicate the security or integrity of records containing personal information.
2.0 Data Security Coordinators
The Data Access Working Group and the Data Stewards are designated as the Data Security Coordinators and are responsible for:
- Protecting personal information collected as written or digital data college wide by ensuring all employees handling personal> identification data are properly trained:
- Conducting an annual training session for all data owners, managers, employees and independent contractors, including temporary and contract employees who have access to personal information on the elements of the Plan. All attendees at such training sessions are required to certify their attendance at the training, and their familiarity with the University’s requirements for ensuring the protection of personal information.
- Ensuring campus wide compliance with this policy and the WPI Security Policies.
3.0 Internal Risks
To combat internal risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, the following measures are mandatory and are effective immediately.
- Each employee shall, upon completion of the training, acknowledge in writing that he/she has receipt of completion of the training.
- The amount of personal information collected must be limited to that amount reasonably necessary to accomplish our legitimate business purposes, or necessary to us to comply with other state or federal regulations.
- Access to records containing personal information shall be limited to those persons who are reasonably required to know such information in order to accomplish your legitimate business purpose or to enable us comply with other state or federal regulations as detailed in the WPI Data Security Policy.
- Electronic access to user identification after multiple unsuccessful attempts to gain access must be blocked as detailed in the WPI Data Security Policy.
- All security measures shall be reviewed at least annually, or whenever there is a material change in our business practices that may reasonably implicate the security or integrity of records containing personal information. The Data Security Managers shall be responsible for this review and shall fully apprise management of the results of that review and any recommendations for improved security arising out of that review in accordance with the WPI Data Security Policy.
- Terminated employees must return all records containing personal information, in any form, that may at the time of such termination be in the former employee’s possession (including all such information stored on laptops or other portable devices or media, and in files, records, work papers, etc.)
- A terminated employee’s physical and electronic access to personal information must be immediately blocked. Such terminated employee shall be required to surrender all keys, IDs or access codes or badges, business cards, and the like, that permit access to the University’s premises or information. Moreover, such terminated employee’s remote electronic access to personal information must be disabled; his/her voicemail access, e-mail access, internet access, and passwords must be invalidated.
- Current employees’ passwords must be changed periodically in accordance with the WPI Data Security Policy.
- Access to personal information shall be restricted to active employees and active user accounts only.
- Employees will be encouraged to report any suspicious or unauthorized use of customer information to the Assistant VP of Information Security.
- Whenever there is an incident that requires notification under M.G.L. c. 93H, §3, there shall be an immediate mandatory post-incident review of events and actions taken, if any, with a view to determining whether any changes in our security practices are required to improve the security of personal information for which we are responsible in accordance with the WPI Network Security Policy.
- Employees are prohibited from keeping open files containing personal information on their desks when they are not at their desks.
- When unattended, all files and other records containing personal information must be secured in a manner that is consistent with the Plan’s rules for protecting the security of personal information and those detailed policies provided in the WPI Data Security Policy.
- Each department shall develop rules (bearing in mind the business needs of that department) that ensure that reasonable restrictions upon physical access to records containing personal information are in place, including a procedure that sets forth the manner in which physical access to such records in that department is to be restricted; and each department must store such records and data in locked facilities, secure storage areas or locked containers. These departmental policies can not remove or negate policies set forth by the WPI Data Security Policy.
- Access to electronically stored personal information shall be electronically limited to those employees having a unique log-in ID; and re-log-in shall be required when a computer has been inactive for more than 20 minutes.
- Visitors’ access must be restricted. Visitors shall not be permitted to visit unescorted any area within our premises that contains personal information.
- Paper or electronic records (including records stored on hard drives or other electronic media) containing personal information shall be disposed of only in a manner that complies with M.G.L. c. 93I.
4.0 External Risks
To combat external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing personal information, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, the following measures are mandatory and are effective immediately.
- There must be reasonably up-to-date firewall protection and operating system security patches, reasonably designed to maintain the integrity of the personal information, installed on all systems processing personal information in accordance with the WPI Data Security Policy.
- There must be reasonably up-to-date versions of system security agent software; which must include malware protection and reasonably up-to-date patches and virus definitions, installed on all systems processing personal information in accordance with policies and procedures detailed in the WPI Data Security Policy.
- To the extent technically feasible, all personal information stored on laptops or other portable devices must be encrypted, as must all records and files transmitted across public networks or wirelessly, to the extent technically feasible. Encryption here means the transformation of data through the use of an algorithmic process, or an alternative method at least as secure, into a form in which meaning cannot be assigned without the use of a confidential process or key, unless further defined by regulation by the Office of Consumer Affairs and Business Regulation. Encryption of data and classifications of data are detailed in the WPI Data Security Policy.
- COMMON RISK: All computer systems must be monitored for unauthorized use of or access to personal information as detailed in the WPI Data Security Policy.
- There must be secure user authentication protocols in place, including:
- Protocols for control of user IDs and other identifiers;
- A reasonably secure method of assigning and selecting passwords, or use of unique identifier technologies, such as biometrics or token devices;
- Control of data security passwords to ensure that such passwords are kept in a location and/or format that does not compromise the security of the data they protect;
- Restriction of access to active users and active user accounts only; and
- Blocking of access to user identification after multiple unsuccessful attempts to gain access.
- The secure access control measures in place must include assigning unique identifications plus passwords, which are not vendor-supplied default passwords, to each person with computer access to personal information.
Please visit the Data Security site for references and information on other Data Security standards.Maintained by itweb
Last modified: May 14, 2010, 11:08 EDT