Policies and Procedures
Chapter 3 General Institution
3721 Administrative Procedure (10/21)
ASC 6/17/21; Cab 9/21/21; CPC 10/2021
October 20, 2021
1. DEFINITIONS. The following definitions shall apply to this procedure:
Sensitive Data: Information Classification that includes Personally Identifiable Information (PII), Protected Health Information (PHI), credit card information, and any data which is considered critical to the ongoing operations of Cabrillo Community College District.
Privileged Account: An account that can take administrative action on Sensitive Data and services.
Remote Access: The ability to access a computer or a network, such as a District computer or network share, from a remote location. Remote access enables users to access the systems they need when they are not physically able to connect directly.
Vulnerability: Any hardware/software errors or other problems that could adversely affect the District.
2. Purpose and Scope
Local, state, and federal regulations mandate the protection of Sensitive Data for students, personnel, vendors, and others. The Cabrillo Community College District (“District”) takes the responsibility of protecting Sensitive Data seriously and recognizes that a robust security posture must be in place to protect the privacy and security of Sensitive Data. The District is committed to protecting the Sensitive Data it collects, transmits, stores, processes, or archives.
In particular, Information Technology shall:
Develop and maintain an Information Security Program that outlines responsibilities all District employees or vendors must follow when accessing Sensitive Data.
Actively inventory, track, and remediate District devices that are connecting to internal network resources to ensure that only authorized devices gain access.
Work with District departments to ensure they have properly inventoried, classified, and securely stored Sensitive Data in accordance with state and federal laws, industry best practices, and related Board Policies.
Conduct a risk assessment for each Information Technology system regularly, or when necessary due to a significant change to Information Technology systems. Document risks and associated security controls.
Actively manage, inventory, and track all authorized software running on District-owned systems. Prevent, to the best of our ability, unauthorized and malicious software from being installed or executed.
Configure and maintain network devices, end-user computing systems, and enterprise computer systems to operate securely, with proper authorization, authentication, and an auditable change management capability.
Continuously assess and remediate vulnerabilities including acquiring information on new vulnerabilities, periodic scanning, vulnerability assessment, and applying software updates and patches in a timely manner.
Ensure that internally developed software is designed with adequate security controls and properly tested prior to being placed into service. Internally developed software shall have an auditable change management process.
Third-party software or systems will be assessed regularly or as needed for adequate security controls prior to purchasing or renewing service contracts.
Provide a secure wireless environment to the internet for students, employees, and guests. The wireless environment shall provide an auditable record of wireless usage.
Conduct regular backups and adhere to Information Security industry best practices to allow for recovery in the event of loss, corruption, or other similar event or circumstances that may occur.
Ensure the continued operation of the District’s Information Technology systems following a man-made or natural disaster, including the creation, maintenance, and periodic testing of a District Business Continuity Plan and Disaster Recovery Plan.
Create and maintain a strong awareness of information security risks and mitigation techniques through increased awareness and training of its employees, students, and vendors to increase knowledge of their information security responsibilities and to minimize information security risks.
Ensure only authorized individuals access District resources through the implementation of information security controls.
Control, track, and audit the use of privileged accounts, restricting the use of these accounts to only users with a verifiable need as determined by their job assignment or supervisor. Provide an audit trail of changes made by privileged accounts to ensure only authorized changes are made by authorized users.
Control and monitor the information flowing through its network to detect and prevent data loss/exposure to unauthorized individuals.
Control access to information assets based upon the need to know. In particular, access to employee and student personal/financial information, health information, and credit/debit card payment information shall be closely controlled and monitored.
Provide for the timely creation and deactivation of accounts for students, employees, vendors, visitors, volunteers, and guests.
Ensure the proper protection of data, as defined in the Information Security Program, through access control and/or encryption while data is in transit through computer networks and while residing at rest on storage media on-site and off-site, on computer systems, and district mobile devices including laptops, tablets, mobile telephones.
Maintain the proper physical security mechanisms for the protection of information processing and storage facilities containing Sensitive Data, that are intended to protect such facilities from unauthorized access, damage, or interference.
Maintain accountability measures and security mechanisms at all times to control remote access to the District’s systems and networks during external remote access use. External connections to the District’s network must be established securely in order to preserve the integrity and availability of the network, including the integrity of data transmitted over the network.
Maintain incident response procedures, and respond to cyber-security incidents in a timely, thorough, and compliant manner.
Ensure that the District’s cybersecurity capabilities are current and effective through periodic testing, audits, and internal and external reviews.