Innovations in digital technologies have markedly increased the use of information technologies in all facets of university life. As such, information and information systems are increasing perceived as vital assets, enabling the accomplishment of the university’s mission and strategic priorities.
While administrative systems are centrally managed at the University of Baltimore, much of the overall information technology infrastructure is a distributed and shared environment. At the same time, much more administrative and academic information is being stored, accessed, and manipulated electronically, increasing the risk of unauthorized disclosure or modification of personal, proprietary, or institutional data. The University of Baltimore must, therefore, maintain effective security programs to mitigate the risks posed to its information technology resources.
The purpose of this policy is to establish a framework for ensuring that the university’s information technology resources are managed securely. These resources include information, information systems, computing platforms, and networks.
This security policy applies to all university information resources and all users who access those resources. While the policy applies to all information resources, it especially pertains to university systems that support vital business functions and those that maintain sensitive personal or institutional information.
It is the policy of the University of Baltimore to establish and maintain a security program that enhances and protects the integrity, confidentiality, and availability of information resources as well as promotes compliance with applicable laws. This program will encompass the following elements:
Equally important, the university recognizes its responsibility to promote an open computing environment that allows access to university computing resources to individuals for authorized purposes. The university has separate policies that addacceptable use of information technology resources; sanctions for the misuse or abuse of university information resources; privacy of electronic information; use of electronic mail; disaster recovery; and others. In addition, the Chief Information Officer or designate has the authority to logically isolate a system from accessing university services or the network if warranted.
Information Technology Resources includes all university-owned computers, applications software, systems software, databases, and peripheral equipment; the data communications infrastructure; the voice communications infrastructure; cltechnologies; communication services and devices, including electronic mail, voice mmodems, and multimedia equipment. The components may be stand-alone or networked and may be single-user or multi-user systems.