IT Security-Policy
IT Security-Policy
Security Policy
1. Introduction
1.1. The threats we face
The University is facing increasing security threats from a wide range of sources.
Systems and networks may be the target of a variety of attacks, including computer
based fraud, surveillance or vandalism. Such threats to I.T. security are generally
expected to become more widespread, more ambitious and increasingly
sophisticated.
In addition, legislation has been introduced, which places legal requirements on the
University to protect personal privacy and to ensure the confidentiality and security of
information and that its use is within the law. The pertinent legislation includes the
Data Protection Act 2018, the Copyright, Designs and Patent Act 1988, The
Regulation of Investigatory Powers Act (RIPA) 2000, the Computer Misuse Act 1990
and the Counter-Terrorism and Security Act 2015 (which encompasses the ‘Prevent’
duty).
This Policy contains terms relating to the classification of data. There are three
classifications: sensitive, confidential and general. Information about which types of
information fall into the different categories is set out in the I.T. Security Procedure
Manual (see below).
This Policy should be read in conjunction with the University Data Protection Policy
Computing Regulations,Research Integrity and Ethics Policy and the Retention and
Disposal schjedule
2. Compliance
The University’s Regulations Governing the Use of Computing Facilities set out the
responsibilities of anyone using University I.T. Systems and are included in the
Student Handbook of Regulations.
This Policy supports and expands the provisions in the University’s Regulations
Governing the Use of Computing Facilities. All members of the University, including
staff, students and any other user with access to University I.T. Systems, must
comply with this I.T. Security Policy.
3. Information Handling
3.1. Classification of information
An inventory will be maintained of all the University’s major corporate I.T. assets and
the ownership of each asset will be clearly stated. Within the inventory, the
information processed by each I.T. asset will be classified according to sensitivity.
3.7. Archiving
The archiving of information must take place with due consideration for legal,
regulatory and business issues, with liaison as needed between IT staff, records
managers and data owners, and in keeping with the University’s Retention Policy.
Storage media used for the archiving of information must be appropriate to its
expected longevity. The format in which the data is stored must also be carefully
considered, especially where proprietary formats are involved.
4.3. Travelling
Portable computing or storage devices are vulnerable to theft, loss or unauthorised
access when travelling. University-approved mobile device management software
must be installed and activated at all times. Devices must be provided with an
appropriate form of access protection such as a password or encryption to prevent
unauthorised access to their contents. Equipment and media should not be left
unattended in public places and portable devices should be carried as hand luggage.
To reduce the opportunities for unauthorised access, automatic shutdown features
should be enabled. Passwords or other similar security tokens for access to the
University’s systems should never be stored on mobile devices or in their carrying
cases. Screens on which sensitive or confidential information is processed or viewed
should be fitted with a privacy filter or be sited in such a way that they cannot be
viewed by unauthorised persons
Export and import controls apply when travelling to certain countries which restrict the
use of encrypted devices. Advice should be taken from IT Support before any travel
arrangements are made.
6. Operations
6.1. Building access control
Areas and offices where sensitive or confidential information is processed will be
given an appropriate level of physical security and access control. Line managers will
provide information on the potential security risks and the measures used to control
them to staff with authorisation to enter such areas.
7. User Management
7.1. User identification
System owners must ensure that procedures for the registration and deregistration of
users and for managing access to all information systems are established to ensure
that all users’ access rights match their authorisations. These procedures must be
implemented only by suitably trained and authorised staff. All users must have a
unique identifier (user ID) for their personal and sole use for access to all the
University’s information services, which should authenticate against the institutional
directory where practicable.
7.2. ID security
The user ID must not be used by anyone else and associated passwords must not be
shared with any other person for any reason. Password management procedures
must be put into place to assist both staff and students in complying with best practice
guidelines.
8. System Planning
8.1. Authorisation
New I.T. Systems relating to teaching, research or the administration of the
University, or enhancements to existing systems, must be authorised by the
University’s I.T. Strategy Group. The business requirements of all authorised
systems must specify appropriate security controls. The implementation of new or
upgraded software or hardware must be carefully planned and managed, to ensure
that the information security risks associated with such changes are mitigated using a
combination of procedural and technical controls.
8.4. Testing
System owners, in consultation with Computing and Library Services, must ensure
that prior to acceptance, all new or upgraded systems or hardware are tested to
ensure compliance with this Policy, access control standards and requirements for
ongoing information security management.
System owners must ensure that all access to systems containing sensitive or
confidential information is logged to identify potential misuse of systems or
information. They must also ensure that password management procedures are put
into place to ensure the implementation of security procedures and to assist users in
complying with best practice guidelines.
Access to operating system commands must be restricted to those persons who are
authorised to perform systems administration or management functions. Use of such
commands should be logged and monitored.
Moves, changes and other reconfigurations of users’ network access points will only
be carried out by staff authorised by Computing and Library Services according to
procedures laid down by them.
All changes must be properly tested and authorised before moving to the live
environment.
9.4. Network design
Computing and Library Services must ensure that the University data and telecoms
network is designed and configured to deliver high performance and reliability to meet
the University’s needs whilst providing a high degree of access control and a range of
privilege restrictions. Appropriately configured firewalls or other security devices must
be used to protect the networks supporting the University’s business systems.
9.5. Logging
System owners must ensure that security event logs, operational audit logs and error
logs are properly reviewed and managed by qualified staff. System clocks must be
regularly synchronised between the University’s various processing platforms.
Acknowledgement
This document draws on copyright information contained in the UCISA Information
Security Toolkit (ISBN 0-9550973-0-4) Edition 2.0, August 2005 and the UCISA
Information Security Management Toolkit, Edition 1.0, March 2015.
POLICY SIGN-OFF AND OWNERSHIP DETAILS
REVISION HISTORY