124  Data Security Policies LOUISIANA STATE UNIVERSITY Security of Data https://sites01.lsu.edu/wp/policiesprocedures/files/2014/09/6.20-NEW.pdf Title/Topic: Security of Data Number: 6.20 Functional Classification: Information Technology Monitoring Unit: Information Technology Services Initially Issued: October 3, 2006 Last Revised: May 20, 2009 Last Reviewed: SECURITY OF DATA PURPOSE This Policy Statement outlines the responsibilities of all users in supporting and upholding the security of data at Louisiana State University (“LSU” or the “University”) regardless of user’s affiliation or relation with the University, and irrespective of where the data is located, utilized, or accessed. All members of the University community have a responsibility to protect the confidentiality, integrity, and availability of data from unauthorized generation, access, modification, disclosure, transmission, or destruction. Specifically, this Policy Statement establishes important guidelines and restrictions regarding any and all use of data at, for, or through Louisiana State University. This policy is not exhaustive of all user responsibilities, but is intended to outline certain specific responsibilities that each user acknowledges, accepts, and agrees to follow when using data provided at, for, by and/or through the University. Violations of this policy may lead to disciplinary action up to and including dismissal, expulsion, and/or legal action. DEFINITIONS For the purposes of this Policy Statement, the following definitions shall apply: Computing resources: shall be defined as all devices (including, but not limited to, personal computers, laptops, PDAs and smart phones) owned by the University, the user or otherwise, which are part of or are used to access (1) the LSU network, peripherals, and related equipment and software (2) data communications infrastructure, peripherals, and related equipment and software (3) voice communications infrastructure, peripherals, and related equipment and software (4) and all other associated tools, instruments, facilities, and the services that make use of any technology resources owned, operated, or controlled by the University. Computing resources or components thereof may be individually assigned or shared, single-user or multi-user, stand-alone or networked, and/or mobile or stationary. Data: shall include all information that is used by or belongs to the University, or that is processed, stored, maintained, transmitted, copied on, or copied from University computing resources. Data Steward(s): shall be defined as the functional unit(s) that is responsible for the
Previous Page Next Page