Skip to main content
Back To Top Top Back To Top
This website publishes administrative rules on their effective dates, as designated by the adopting state agencies, colleges, and universities.

Rule 3357:15-16-15 | Cybersecurity policy.

 

(A) Purpose: To meet each requirement for the minimal risk profile in the cybersecurity assessment tool (CAT) of the federal financial institutions examination council (FFIEC), to comply with the information technology examination handbook (IT handbook) and the national institute of standards and technology (NIST) cybersecurity framework, and to continue to increase cybersecurity maturity from baseline to evolving and beyond, as those terms are described in the instructions of the CAT.

(B) Authority: C.F.R. Title 16 Chapter I Subchapter C Part 314, which implements sections 501 and 505(b)(2) of the Gramm-Leach-Bliley Act, sets forth standards for developing, implementing, and maintaining reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of customer information.

(C) Scope: The college shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to our size and complexity, the nature and scope of its activities, and the sensitivity of any customer information at issue. The information security program shall include the administrative, technical, or physical safeguards the college uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle customer information. Such safeguards shall include the elements set forth in paragraph (D) of this rule and shall be reasonably designed to achieve the following objectives:

(1) Insure the security and confidentiality of customer information;

(2) Protect against any anticipated threats or hazards to the security or integrity of such information; and

(3) Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer.

(D) Program: The college shall develop, implement, and maintain its information security program in the following manner:

(1) Designations: The college designates its vice president for business, finance and information technology or his or her qualified designee to lead the cybersecurity coordinating committee, including the director of information technology and the director of financial aid to coordinate the college's information security program.

(2) Assessments: The cybersecurity coordinating committee will identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of college operations, including:

(a) Employee training and management;

(b) Information systems, including network and software design, as well as information processing, storage, transmission and disposal; and

(c) Detecting, preventing and responding to attacks, intrusions, or other systems failures.

(3) The cybersecurity coordinating committee will ensure that the college designs and implements information safeguards to control the risks it has identified through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards' key controls, systems, and procedures.

(4) The cybersecurity coordinating committee will oversee service providers, by:

(a) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and

(b) Requiring the college's service providers by contract to implement and maintain such safeguards.

(5) The cybersecurity coordinating committee will evaluate and adjust the college's information security program in light of the results of the testing and monitoring required by paragraph (D)(3) of this rule; any material changes to college operations or business arrangements; or any other circumstances that the college knows or has reason to know may have a material impact on its information security program.

(E) Public records: Procedures shall be documented and utilized by the college. To the extent such documentation meets the definition of "security record" or "infrastructure record" as identified by division (B)(1) of section 149.433 of the Revised Code, those records shall not be public records and shall not be subject to release or inspection by the public.

Supplemental Information

Authorized By: 3357
Amplifies: 3357