Adopted by President’s Cabinet 4/27/21
The purpose of this policy is to provide guidance for the appropriate usage and security of confidential and sensitive information at East Georgia State College and is essential for compliance with federal and state law and the University System of Georgia (USG) requirements.
Users, hereinafter referred to as data users, include but are not limited to students, faculty, staff, external contractors, and visitors. This includes faculty and staff while serving as researchers or principal investigators.
Definitions and Acronyms from USG BPM
- Unrestricted/Public Information is information maintained by a USG organization that is not exempt from disclosure under the provisions of the Open Records Act or other applicable state or federal laws. Some level of control is required to prevent unauthorized modification or destruction of public information. Examples include EGSC website, EGSC promotional materials, etc.
- Sensitive Information is information maintained by a USG organization that requires special precautions to protect from unauthorized use, access and disclosure guarding against improper information modification, loss or destruction. Sensitive information is not exempt from disclosure under the provisions of the Open Records Act or other applicable state or federal laws but is not necessarily intended for public consumption. Example: departmental continuity of operations plans.
- Confidential Information is information maintained by a USG organization that is subject to authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. (44 USC Sec 3542) Confidential classified documents are exempt from disclosure under the provisions of the Open Records Act or other applicable state or federal laws. Examples include non-public proprietary, confidential information and documents containing such information as Social Security number, driver’s license number, state identification card number, personal identification numbers, education records and grades.
- Research Data is the recorded factual material commonly accepted in the scientific community as necessary to validate research findings. This includes (1) information from or regarding data sets used in research; unpublished proprietary information, preliminary analyses, drafts of scientific papers, plans for future research (2) peer reviews or communications with colleagues; personal and medical information and similar information obtained from or about participants in a research study, the disclosure of which would violate their consent to participate in the study or information that could be used to identify a particular person in a research study. Research data is exempt from public disclosure under the Georgia Open Records Act unless such data is publicly released, published, copyrighted or patented.
- All data users will adhere to all current IT policies and procedures required by EGSC and USG.
- Data users will only use confidential and/or sensitive information in support of the business EGSC has authorized the data user to perform. Data users will not use, disclose, or publish confidential and/or sensitive information for any reason other than official EGSC business.
- Research data that incorporates personally identifiable or sensitive elements (such as Social Security numbers), or proprietary college information or trade secrets or includes controlled unclassified information or export controlled information, must have adequate security protections and be treated as restricted data.
- It is the responsibility of the Principal Investigator to properly identify the classification of their data and to provide appropriate protections, as well as any additional data security that may be specifically required under the terms of a sponsored program agreement (such those in the Federal Information Security Management Act or the Food and Drug Administration’s electronic records regulation).
- The data user understands that EGSC reserves the right to impose legal and/or disciplinary action against the data user in the event of unauthorized use or disclosure of confidential and/or sensitive information.
- Confidential and/or sensitive information must not be transferred by any method to persons who are not authorized to access that information. Users must ensure that adequate security measures are in place at each destination when confidential and/or sensitive information is transferred from one location to another.
- Confidential information must be encrypted while at rest and while in transit, consistent with the USG Information Technology Handbook, Section 5.1.2, and Georgia law.
- Confidential and/or sensitive information must be stored and accessed in appropriate college provided system and only copied locally if encryption or approved security precautions have been applied to protect that information. Servers and other computers storing all college information shall have a data protection strategy in place and shall be regularly scanned for vulnerabilities and patched.
- Users are prohibited from storing confidential and/or sensitive information on cloud services not provided by the college.
- Users are required to store all institutional data in alignment with the USG BPM definitions and above storage rules. Questions concerning data classification and storage should be directed to EGSC’s Data Security Officer.
EGSC reserves the right, at its sole discretion and without prior notice to a data user, to temporarily or permanently rescind a data user’s access to confidential and/or sensitive information if it determines a breach of any provision of this policy has taken place. The data user understands and agrees that any unauthorized access or disclosure of confidential and/or sensitive information may subject the offender to disciplinary action by EGSC, up to and including administrative or student conduct review, termination or legal action.
The Vice President for Information Technology reserves the right to disable a system accounts and user accounts if activity is inconsistent with applicable laws and college policy.
The Vice President for Information Technology or his designee will review the Data Security Policy annually.