Information Technology (IT) Security Regulation 513
Regulation 513 | Approved: June 5, 2023 |
UNIVERSITY OF NORTH CAROLINA SCHOOL OF THE ARTS Information Technology Data Governance and Management Regulation 513 |
|
Source of Authority: | UNC System adoption of ISO/IEC 27002 ISO/IEC 27002:2013 8.2 Classification of Information UNC System Policies 1400 Series on Information Technology |
Revision Authority: | Chancellor |
History: |
First Issued: June 5, 2023 |
Related Policies: | Information Technology Security Regulation 512 |
Responsible Offices: |
Office of Information Technology Office of Institutional Research |
Effective Date: | June 5, 2023 |
I. Purpose
The purpose of this regulation is to define the Data Governance Program used at the
University of North Carolina School of the Arts (UNCSA) to ensure the formal management
of university information resources and data.
II. Scope
This regulation applies to any person or entity using university information resources and data, including but not limited to all university faculty, staff, students, affiliates, contractors, vendors, and consultants. As such, all users of university information resources and data must be familiar with and comply with this regulation and related procedures, rules, standards, technical specifications, and any other guidance issued by the university in support of this regulation.
This regulation further applies to all university information resources and data, regardless of form or location, and the hardware and software resources used to electronically store, process, or transmit data. This includes data processed or stored and applications used by the university in hosted environments in which the university does not operate the technology infrastructure.
III. Definitions
A. Affiliate: An affiliate is an individual who requires access to information resources to work in conjunction with the university, but is not a UNCSA employee or student.
B. Data Classification: Data classification refers to the categorization of information resources and data, and consistent application of security standards based on such categorization. University data will be classified according to the UNCSA Information Technology (IT) Security Regulation 512.
C. Data Handling: Data Handling refers to the actions that Data Users should take to use, process, transmit, store, archive, and destroy university data in a secure manner that aligns with the classification of the data.
D. Data Lifecycle: The data lifecycle is the progression of stages in which a piece of information may exist between its original creation or collection and final archival or destruction.
E. Information Resources: As used in the University of North Carolina (UNC) System Policy 1400.1, “information resources are information owned or processed by the university, or related to the business of the university, regardless of form or location, and the hardware and software resources used to electronically store, process or transmit that information.” Information resources expressly include data, software, and physical assets. The term university data may be used interchangeably with the term information resources in this regulation.
IV. Regulation
A. University Authority. The university has authority over the use of its information resources and data and is the legal custodian of all university information resources and data. University information resources and data are valuable assets, the use of which must be aligned with the administrative, educational, and institutional research functions of the university.
B. Data Governance Program. The university shall establish a Data Governance Program to guide the strategic use, management, and reporting of university data. The Data Governance Program shall ensure that university data is used in compliance with federal, state, and local regulations, applicable university policies and regulations, and relevant contractual obligations. The Data Governance Program shall be established by a charter that lays out the objectives of the program, program structure and organization, data governance roles and responsibilities, and program metrics.
C. Data Classification. All university information resources and data must be classified and can have only one classification. The university uses four data classification levels based on the nature of the information resources, data, and relevant compliance requirements:
i. Level 1 (Confidential Data) – University data that are protected by federal, state, or local statutes and regulations, industry regulations, provisions in government research grants, or other contractual arrangements, which impose legal and technical restrictions on the appropriate use of institutional information.
ii. Level 2 (Sensitive Data) – University data that may not be protected by law or regulation but are considered private and are subject to restricted treatment such as university data that may be protected by contracts, third-party agreements, or university regulation.
iii. Level 3 (Controlled Data) – University data that are proprietary or produced only for use by members of the university community who have a legitimate purpose to access such data.
iv. Level 4 (Public Data) – University data that have few restrictions and/or are intended for public use.
D. Data Lifecycle and Data Handling. All university faculty, staff, students, affiliates, contractors, vendors, and consultants are collectively responsible for the management of all university data throughout the data lifecycle. The university shall issue regulations, procedures, rules, and standards as appropriate that address the quality, consistency, usability, accessibility, availability, and protection of university information resources and data throughout its lifecycle and according to classification level. (References: UNC System Policy 1400.1; UNC General Records Retention and Disposition Schedule; UNCSA Records Retention Policy.)
V. Roles and Responsibilities
All university employees are responsible for supporting data governance. This includes not only individuals with management and oversight roles defined by the Data Governance Program but also any user of university information resources and data. Specific roles and responsibilities regarding university data include:
A. Chancellor: The Chancellor has final authority over all university information resources and data. The Chancellor and Chancellor’s designees are responsible for overseeing the protection of university data according to the security level assigned. The Chancellor makes the following delegations in support of this regulation:
i. The Executive Team shall serve as the executive sponsors for the university Data Governance Program and have the responsibilities set forth in the Data Governance Program charter.
ii. The Chief Information Security Officer (CISO) and the Director of Institutional Research shall serve as the university officials responsible for administering the Data Governance Program in accordance with this regulation and the Data Governance Program charter.
B. Data Governance Committee: The Data Governance Committee, with membership consisting of the Data Stewards and other individuals determined by the committee co-chairs, is an inter-departmental group accountable to the Executive Team, with the authority to make decisions on all aspects of data governance for the university. The Data Governance Committee is tasked with overseeing data governance strategy, policy, risk management, and data management, ensuring engagement across the institution, and promoting a culture that embraces the responsible use of data and resources to achieve institutional goals.
C. Data Governance Committee Co-Chairs: The Director of Institutional Research and the Chief Information Security Officer (CISO) are the co-chairs of the Data Governance Committee. The co-chairs lead the Data Governance Program, report to the Executive Team on program activities, and, in consultation with the Executive Team, mediate conflicts and discrepancies between the interests of the Data Stewards and the needs and interests of the university.
D. Data Stewards: Data Stewards are delegated by and accountable to the Executive Team for the accuracy, privacy, and security of the institutional data under their responsibility. As a collective group, the data stewards comprise the Data Governance Committee.
E. Data Administrators: Data Administrators are university employees who are information technology experts assigned specific data management, access management, and information security responsibilities by the appropriate Data Steward.
F. Data Users: Data Users are all users granted access to university information resources and data, including but not limited to university employees, affiliates (e.g., contractors, partners, volunteers), and students.
VI. Enforcement / Addressing Concerns
All users of university information resources and data must be familiar with and comply with this regulation and related standards, guidelines, and procedures issued by the university in support of this regulation. Failure to comply with the requirements of this regulation and related documents may result in harm to individuals, organizations, or the university. Failure to comply with the requirements of this regulation may result in university discipline, termination of volunteer service, or a determination that the user has materially breached an agreement, and in some cases may be subject to civil lawsuit liability and criminal prosecution.
Questions about this regulation, the university’s Data Governance Program, and any related standards, guidelines, and procedures issued by the university in support of this regulation should be addressed to:
Information Technology Services, technologysupport@uncsa.edu
VII. Revision History
June 5, 2023 – Adopted by the Chancellor as part of the UNCSA Policy Manual
VIII. Related Regulatory and Policy References
VIX. Data Governance Responsibilities by Role
Role | Representation | Responsibility |
Executive Team |
Executive level program sponsors |
|
Data Governance Committee (DGC) |
Campus leaders with data decision authority, as determined by the DGC co-chairs, with
approval from the Executive Team |
|
Data Stewards |
Department leaders or stakeholders with primary responsibilities for the use, accuracy, privacy, and security of a designated set of institution data |
|
Data Administrators |
Employees with specific data management responsibilities (usually UNCSA employees who are information technology experts) |
|
Data Users All university employees, affiliates, and students |
Users granted access to institutional data Information resource user (when using information resources, you have these information security responsibilities) |
|