Develop, implement, and maintain a written information security program; |
LETU Information Security Program Home Index
(Controls, Safeguards and Compliance)
LETU Information Security Program & Compliance Reference
Security Awareness Program: Title IV Data
|
a. Designate a Qualified Individual to implement and supervise your company's information security program |
Title IV Information Security Program Responsibilities |
b. conduct a risk assessment |
Data Classification Standard
LETU Policy 6.2: Data Classification (Secure Document: available internally)
Annual Risk Assessment (Secure Document: available internally)
NIST Framework for Improving Critical infrastructure CyberSecurity v1.1
(Secure Document: available internally)
|
c. Design and implement safeguards to control the risks identified through your risk assessment |
Security Safeguards Program: Title IV Data
|
c (1). Implement and periodically review access controls |
Annual Systems Re-Authorization/FERPA agreement Overview
(Secure Document: available internally)
Reauth Collection Script
(Secure Document: available internally) |
c (2). Know what you have and where you have it |
Data Inventory (Secure document: available internally) |
c (3). Encrypt customer information on your system and when it's in transit |
Data Inventory (Secure document: available internally) |
c (4). Assess your apps |
LETU HECVAT and Cloud Vendor Guidelines (Required for approval of new Information Systems Vendors)
Data Inventory (Secure document: available internally)
Change Request Process (Secure document: available internally) |
c (5). Implement multi-factor authentication for anyone accessing customer information on your system |
LETU Multifactor Authentication (MFA) Requirement |
c (6). Dispose of customer information securely |
LETU Policy 6.12: Data Retention (Secure Document: available internally)
Disposal of Disk, Tape and other Media
Data Retention Procedures
|
c (7). Anticipate and evaluate changes to your system or network |
Change Request Process (Secure document: available internally)
Orion Network Config Manager (Secure system: available internally)
|
c (8) Maintain a log of authorized users' activity and keep an eye out for unauthorized access |
Title IV Safeguards c(8) documentation
(Secure Document: available internally) |
d. Regularly monitor and test the effectiveness of your safeguards |
Vulnerability Scanning (Secure Document: available internally)
Penetration Testing (Secure Document: available internally) |
e. Train your staff |
LETU 6.11 Cyber Security Training Policy (Secure Document: available internally) |
f. Monitor your service providers |
LETU HECVAT and Cloud Vendor Guidelines (Required for approval of new Information Systems Vendors)
Acceptable Use for Technology Systems
LETU Policy 6.1: Acceptable Use for Technology Systems (Secure Document: available internally)
|
g. Keep your information security program current |
Security Awareness Program: Title IV Data |
h. Create a written incident response plan |
LETU Information Technology Continuity Plan (Secure document: available internally) |
i. Require your Qualified Individual to report to your Board of Directors |
Annual Information Security / Risk Assessment Report to LETU Board of Trustees occurs in Fall of each year. (Secure document: available internally) |