860 Information Security
| SUBJECT: | INFORMATION SECURITY |
| NUMBER: | 860 |
| AUTHORIZING BODY: | PRESIDENT'S CABINET |
| RESPONSIBLE OFFICE: | CHIEF OF STAFF |
| DATE ISSUED: | MARCH 2005 |
| LAST UPDATE: | FEBRUARY 2026 |
|
RATIONALE: In the course of carrying out its academic, research and clinical missions, faculty, staff, and students at Oakland University (“Oakland,” “OU,” or the “University”) collect many different types of information, including financial, academic, medical, human resources, and other personal information. Federal and state laws and regulations, research agreements, contracts, and other industry standards impose obligations on the University to protect the information relating to faculty, staff, students, research subjects, and patients. This information is an important resource of the University, and any person who uses information collected by the University has a responsibility to maintain and safeguard its security, integrity, and availability. |
|
|
POLICY: A trusted and effective information technology (IT) environment with controls to ensure the security, integrity, and availability of Information Resources is vital to the University’s ongoing mission of education, research, scholarship, and creative activity. University Technology Services will: 1. Establish an overarching Information Security Program to establish an environment of internal controls designed to maintain, facilitate, and promote adequate protection of Information Resources through standards, procedures, guidelines, information-sharing, and training. 2. Protect Oakland University’s electronic data through appropriate safeguards to ensure data privacy and security at each level of access and control. Three Data Classifications: Confidential, Internal, and Public (Formerly referred to as Confidential, Operations Critical, and Unrestricted.)
3. Foster collaboration among faculty, staff, researchers, students, and IT personnel to enhance security awareness and best practices. Recognizing the rapid evolution of technology, the University will adopt an adaptive security model to address emerging risks proactively. 4. Ensure access to Information Resources is governed, where possible, by role-based access controls (RBAC) and the principle of least privilege. University constituents will be granted access only to the resources necessary to fulfill their roles. Authentication mechanisms aligned with industry standards, including Multi-Factor Authentication (MFA), passkeys, and biometrics, will be implemented where applicable. 5. Support the responsibilities of Data Owners, Data Stewards, Data Custodians, and Data Users by providing clear guidelines and security measures to ensure appropriate data handling, storage, and transmission. 6. Manage security risks through administrative, technological, and physical controls. Regular risk assessments will be conducted to identify vulnerabilities, evaluate threats, and implement mitigating controls. Third-party vendors with access to University Information Resources will be subject to security reviews and contractual obligations. 7. Implement security and privacy controls to meet legal and regulatory requirements, including, but not limited to, FERPA, PCI, HIPAA, and other applicable state and federal laws. 8. Review Information Security Policies, standards, and procedures at least annually to ensure continued effectiveness and compliance with evolving threats, technological advancements, regulatory changes, and/or problems identified during risk assessments. 9. Ensure the resilience of IT operations by partnering with University stakeholders to develop a comprehensive Business Continuity Planning (BCP) framework. Critical systems and data will be identified, and contingency measures will be implemented to minimize operational disruptions, including redundancy, data backups, and recovery plans. Regular testing and updates of continuity plans will ensure preparedness for unforeseen events. 10. The University will establish an Incident Response (IR) program to detect, assess, respond to, and recover from security incidents in a timely manner. The IR Program will define roles and responsibilities, escalation procedures, and communication protocols. All incidents will be logged, analyzed, and reported as necessary to mitigate impact and enhance future resilience. The University will comply with relevant breach notification laws and coordinate with law enforcement or regulatory bodies when required. Sanctions: Failure to comply with the requirements of this policy will be considered inappropriate use of the University’s Information Resources and, therefore, a violation of OU AP&P #890 Acceptable Use Policy. Sanctions for violating this policy will be implemented in accordance with the sanctions section of OU AP&P #890 Acceptable Use Policy. |
|
|
SCOPE AND APPLICABILITY: This policy is University-wide and applies to all individuals who access, use, or control Information Resources at the University. |
|
|
DEFINITIONS: |
|
|
PROCEDURES:
This Policy defines the key functions and roles in the Information Security Program, authorizing responsible personnel to execute security policies. A. Executive Management University senior officials (e.g., Provost, Deans, VPs, Department Chairs), following guidance from the Oakland University IT Governance Committee, are responsible for overseeing security compliance in their areas by:
B. Security, Policy & Compliance Governance The IT Risk and Security/Compliance Steering Committee (ITRSCSC) is responsible for providing high-level strategic oversight for IT risk and security management, aligning efforts with university objectives, and ensuring compliance with regulations. C. Security Management The Information Security Office (ISO) within University Technology Services (UTS) is responsible for:
Authority granted to UTS and the ISO by Executive Management includes:
The Chief Information Security Officer (CISO) manages the Information Security Program (ISP). D. Data Ownership Data Owners (Directors, Faculty, Research/Administrative Officers) are responsible for:
E. System Ownership System Owners (Faculty, Researchers, Administrative Officers) will manage IT systems by:
F. Technical Ownership IT Custodians will ensure secure infrastructure by:
G. System & Data Usage Users (faculty, staff, students, contractors) must:
H. Applicable Laws, Regulations, and Industry Standards The University shall adhere to applicable federal, state, local laws, and industry regulations and standards. |
|
|
RELATED POLICIES AND FORMS: |
|
|
APPENDIX: |
|
OU Administrative Policies and Procedures