(A) Purpose. The purpose of this policy is to enable the use of innovative technology by members of the university community while utilizing available resources to mitigate the risk of unauthorized access or disclosure. All computer systems either accessing or storing institutional data or operating on the university network must meet the information security standards as defined or otherwise referenced in this rule.
(1) Application. A set of one or more computer programs designed to permit users to perform a group of coordinated functions, tasks, or activities. Examples of applications include but are not limited to: Blackboard, Drupal, Empower, and other application programs installed by the user or administrator on a device or server. For the purpose of this rule, covered applications are limited to those applications running or installed on university-owned information technology, on any server and/or storage device used to hold or transmit institutional data, or any cloud-based server and/or storage device.
(2) Physical server. A dedicated physical computer on a network that is capable of accepting requests from multiple university clients and providing responses accordingly.
(3) Virtual server. A server created through the use of software known as a hypervisor that allows a single physical computer to be partitioned into multiple server computing units.
(4) Storage device. A device used for recording and storing information (i.e. institutional data).
(5) Network attached storage device. A computer connected to a network that provides only file-based data storage services to other devices on the network.
(6) Firewall. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
(7) Institutional data. All data created, collected, maintained, recorded or managed by the university, its staff, and agents working on its behalf. It includes data used for planning, managing, operating, controlling, auditing and reporting on university functions. When appropriate, institutional data may also include research data that contains personally identifiable subject information, or proprietary university information.
(C) Scope. This policy applies to all student employees, faculty, staff, (collectively "university stakeholders") and third parties acting on behalf of Kent state university as well as any other university affiliate authorized to access or is in possession of Kent state university institutional data and IT resources. This policy applies but is not limited to all computer systems (applications, physical servers, virtual servers, and storage devices) that process or store university information. The policy applies both to computer systems that are run locally at Kent state university and those that are hosted or maintained by outside vendors. Exceptions to this policy must be approved by the vice president for information services and formally documented. Exceptions will be reviewed on a periodic basis and may be withdrawn at the discretion of the vice president for information services.
(1) The division of information services ("IS" or "information services") is responsible for documenting the required security standards, updating on a periodic basis, and posting to the IS website at www.kent.edu/is/security.
(a) Such security standards as adopted and maintained by the division of information services are intended to ensure adherence to the standards set forth by existing laws and regulations, such as but not limited to: Sections 1349.19 and 149.43 of the Revised Code; the Family Educational Rights and Privacy Act; and the Health Insurance Portability and Accountability Act.
(2) Existing computer systems (applications, servers, and storage devices) will be audited against the current standards.
(3) All new requests for computer systems (applications, servers, and storage devices) must be reviewed by information services to ensure the proposed system meets the security standards.
(4) University stakeholders must receive prior approval from the division of information services before utilizing externally managed services, applications, and servers.
(a) Vendors of externally managed services and applications shall be required to complete the vendor security checklist prior to engagement of such resources or transmission of institutional data. Such checklists must be reviewed by IS.
(c) Any storage of institutional data with external service providers requires the prior approval of information services.
(5) Servers and network-attached storage devices operating on the Kent state university network shall be operated in the university secure data center.
(a) Access to the data center shall be controlled by IS operations staff.
(b) All devices shall reside behind IS-managed firewalls.
(c) Remote access shall be approved and managed by IS access management.
(6) All applications are subject to vulnerability assessments by IS. In the event of the identification of a critical vulnerability, IS shall require remediation in order for the user and/or server/storage device to remain on the network.
(7) The use or storage of sensitive institutional data (including but not limited to personally identifiable information, or other information protected from unauthorized disclosure by law, regulations or policy) on any server or storage device for any purpose must adhere to the processes, standards, and requirements as directed by IS access management.
(8) Domain names other than kent.edu acquired by university stakeholders for the operation of applications must be obtained and registered through information services.
(9) Violations of this policy may result in suspension or loss of the user's access to computing, storage, or network resources, with respect to institutional data and university-owned information technology.