Electronic Use of Confidential Data
Purpose
This document details the University of Dayton’s policy on the secure electronic access, use, storage, and disposal of confidential information as categorized in Appendix A.
Scope
This policy applies to all University personal computing and communication devices and all UD servers and services (whether located at UD or hosted externally) hosting data. Confidential data should not be hosted on personally owned devices.
Individual data elements are classified as personally identifying or business sensitive in Appendix A. Separate documents within the associated framework will provide detailed standards describing how systems hosting these classifications, as well as public information, must be administered from data collection to system disposal.
A future addendum to this policy should include guidance on the use, storage, and disposal of paper-based confidential information.
Policy History
Effective Date: February 2008
Approval: December 17, 2015
Policy History:
- Approved in Original Form: February 2008
- Approved as Amended: December 17, 2015
Maintenance of Policy: Vice President and Chief Information Officer, University of Dayton Information Technology (UDit), and Finance and Administrative Services
Policy
The University of Dayton has an obligation to protect the confidential data it collects and processes in pursuit of its business operations. Staff and students will be educated regularly as to the legal and ethical concerns/requirements surrounding confidential data, their own as well as that of fellow students and colleagues, and its handling.
Long used as unique identifiers, the Social Security Number (SSN) is a frequent target for identify theft and other illegal and harmful activities and requires special mention. The University’s official position on the use of SSNs, based on executive directive, is to use SSNs only where explicitly required by law or explicitly approved by the Provost.
In all other cases, the University requires the use of a unique University ID (UDID) number. The UDID numbers replace SSNs for identification and as indices to personnel records.
The following guidelines govern information classified as either personally identifying or business sensitive:
- Disclosure: Forms and web pages requesting confidential data should contain a privacy disclosure outlining, but not limited to, what will be collected, who authorized collection of this data, how the data will be used, how long the data will be maintained, how to correct data elements and who will have access to data
- Storage: Servers, whether located at UD or hosted externally, containing confidential data must be implemented in accordance with documented standards and subject to audit. All devices (including servers, backup tapes, desktop/laptop computers, removable media and mobile communication devices) hosting confidential data require encryption of data at rest or suitable compensating control
- Access: Access to confidential data is restricted to those with a demonstrated business need and requires regular renewal of a confidentiality agreement
- Transmission: Transmission of confidential data requires use of encrypted transport protocols
- Discovery: Automated tools will be provided and used to discover and log existence of confidential data on servers and personal computing/communications devices
- Disposal: Media housing confidential/sensitive data must be physically destroyed or sanitized in accordance with NIST standards or equivalent upon disposal or redeployment in accordance with UD’s Equipment and Removable Media Disposal Policy
Servers will be periodically audited in accordance with UD’s Server Audits policy to ensure adherence to standards for access, use, and storage of data types as outlined by this policy and related standards documents. An inventory of Approved Hosts of Confidential Information will be maintained, reviewed, and approved regularly by the VP for Finance and Administrative Services (or a delegate). Any exceptions to the framework requirements must be approved and documented.
The authority to monitor and ensure compliance will be the responsibility of the UDit Risk Management Officer in cooperation with the CIO and VP for Finance and Administrative Services. Violations of this policy will be considered serious and will result in disciplinary action. An employee who violates this policy may be held responsible for the cost of mitigation due to loss or breach.