BOG Governance Rule 1.11 – Information Technology Resources and Governance
-
PURPOSE & SCOPE.
- The Board of Governors (“Board”) seeks to outline the guiding principles for using, securing, and maintaining Information Technology Resources.
- This Rule applies to all West Virginia University staff, faculty, students, and volunteers, as well as any third-party individuals and entities, who access the Information Technology Resources of West Virginia University. The Rule also applies to West Virginia University, West Virginia University Institute of Technology and Potomac State College of West Virginia University (collectively the “University”).
-
DELEGATION TO PRESIDENT OF INFORMATION TECHNOLOGY POLICIES AND PROCEDURES.
- Delegation. To enable the University to function in a proper, expeditious, and secure manner and to advance the University’s mission and objectives, the Board delegates to the President the following authority to establish and maintain a framework for the routine review and implementation of policies and procedures aimed at creating a rich, integrated, compliant, and secure electronic environment in which to educate students, engage in research, perform outreach services, and conduct the University’s business.
- Reporting. At least annually, the Board shall be provided with an update on matters relating to the deployment of Information Technology Resources and information security; provided, however, that the Chair of the Board shall promptly be notified of any significant Information Security Event.
-
INFORMATION TECHNOLOGY GOVERNANCE.
- There shall be framework for governance and compliance within the University that, at a minimum:
- Provides reliable Information Technology Resources that are readily available for use by Authorized Users in accordance with an established acceptable use policy.
- Establishes guidelines for the responsible management of University-owned Information Technology Resources including the purchase, inventory, and replacement of such resources.
- Safeguards the confidentiality and integrity of Information Technology Resources from unauthorized access, loss, alteration, or damage while also supporting the open, information-sharing needs of our academic culture.
- Establishes information security and risk management strategies that outline an efficient and effective process for responding to an Information Security Event.
- Provides awareness and training materials to the University community regarding information privacy and security policies, standards, guidelines, and best practices, including notifying Authorized Users that there is no expectation of privacy when using Information Technology Resources which are owned or controlled by the University.
- Provides for the security and privacy of University data in accordance with applicable laws and definable information technology security standards.
- Implements a prevention program that is documented in writing and designed to identify and detect the warning signs (“red flags”) of Identity Theft in day-to-day operations.
- Fosters effective collaboration within the University to efficiently provide Information Technology Resources and technical support that aligns with up-to-date technologies, trends, and issues.
- All information technology policies and procedures shall be consistent with Federal and State law and any Rule adopted by the Board of Governors.
- There shall be framework for governance and compliance within the University that, at a minimum:
-
ENGAGEMENT WITH UNIVERSITY COMMUNITY AND OVERSIGHT
- Where appropriate, the President is encouraged to seek input from the University community through formal committees as well as other informal efforts regarding the development and implementation of information technology policies and procedures.
- The President shall establish an appropriate framework for oversight and enforcement of information technology policies and procedures.
- At least once every three years, a comprehensive review of the University’s information technology policies and procedures should be undertaken. To conduct such a review, the University may involve external consultants.
-
SECTION 5: DEFINITIONS.
- “Authorized Users” means faculty, staff, students, volunteers, and other third parties who have been granted access via WVU Login credentials to the University’s Information Technology Resources.
- “Information Security Event” means any real or suspected event that may adversely affect the availability and security of the University’s Information Technology Resources that support academic, administrative, or research operations.
- "Identity Theft" means fraud committed or attempted using identifying information of another person without authorization.
- “Information Technology Resources” means hardware, software, and communications equipment, including, but not limited to, computers, email, internet, mainframes, wide and local area networks, servers, mobile or portable computers, peripheral equipment, telephones, wireless communications, facsimile machines, technology facilities (including but not limited to: data centers, dedicated training facilities, and switching facilities), and other relevant hardware and software items as well as personnel tasked with the planning, implementation, and support of technology.
- “President” means the President of the University or the President’s designee.
-
AUTHORITY.
- W.Va. Codes §18B-1-6, § 18B-2A-3, and 15 U.S.C. 1681 et seq. and its implementing regulations 16 CFR Part 681.
-
SUPERSEDING PROVISIONS.
- This Rule supersedes and replaces any rule of the Higher Education Policy Commission which relates to the subject matter contained within this Rule. This Rule also repeals and supersedes WVU BOG Policy 54 – Rule on Identity Theft Detection and Prevention Program adopted January 29, 2010, and any other internal University policy or procedure which relates to the subject matter contained within this Rule.