Standard: S-32Responsible Executive: Vice President for Information Technology and Systems Chief Information OfficerResponsible Office: Office of the Vice President for Information TechnologyDate Issued: November 1, 2025Date Last Revised: N/A
ContactsIndividuals and Entities AffectedStatement of StandardResponsibilitiesDefinitions (defined terms are capitalized throughout the document)Related Documents, Forms and ToolsHistory and UpdatesAppendix
Purdue Systems Security765-494-4000| itpolicyanswers@purdue.edu
Regulatory and Contract Determinations
Research Security and Export Controls765-496-2518 | rsec@purdue.edu
This standard applies to all persons, departments, units, and campuses who may access, generate, store, process, or transmit Controlled Unclassified Information (CUI), Export Controlled Research, or any other information subject to a System Security Plan (SSP) or Technology Control Plan (TCP).
Purdue University adheres to federal requirements for safeguarding, disseminating, and handling of Controlled Unclassified Information (CUI) on University Information Systems. This standard applies only to CUI that is categorized as Defense, Export Control, Intelligence or otherwise subject to Cybersecurity Maturity Model Certification (CMMC). Applicable federal requirements include:
Additional safeguarding or disclosure requirements, including the U.S. Cybersecurity Maturity Model Certification (CMMC) Program and other applicable clauses, may also apply depending on the terms of the contract.
This standard aligns Purdue University policy, federal requirements for protecting CUI, NIST SP 800-171 (as updated or amended), and CMMC Level 2 controls. The development of Purdue’s CMMC Compliance Program promotes adherence to these standards. Compliance ensures the University maintains the necessary security posture to protect CUI, supports federal contract requirements, and fosters a secure research environment.
To ensure the security of CUI, the University follows the guidelines established in NIST SP 800-171 (as updated or amended), which identifies 14 control families. These families provide the foundation for Purdue University’s security strategy in protecting CUI resources and data. Detailed policy for each control family can be found in Purdue’s CMMC Compliance Program (Purdue login required).
Any individual who fails to comply with this standard, associated University policy, applicable SSPs, TCPs, Purdue’s CMMC Compliance Programs, or applicable federal requirements, may be subject to disciplinary action, up to and including termination of employment. Noncompliance may also result in sponsor-imposed remedies, including contract termination, liability for damages, or loss of eligibility for federal funding, and can negatively impact national security and prosperity.
Chief Information Security Officer (CISO)
Research Security and Export Controls (RSEC)
Information System Security Officer (ISSO), CUI
Sponsored Program Services
Covered IT Resource Owner(s)
Users Accessing or Generating CUI
Vice President for Information Technology and Systems Chief Information Officer
All defined terms are capitalized throughout the document. Refer to the central Policy Glossary for additional defined terms.
Controlled Unclassified Information (CUI)As defined in Executive Order 13556, information held by or generated for the federal government that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations and government-wide policies that is not classified under Executive Order 13526 or the Atomic Energy Act, as amended. Federal CUI is divided into several categories and subcategories and is listed in the CUI registry managed by the National Archives and Records Administration.
Cybersecurity Maturity Model Certification (CMMC) The U.S. certification program institutionalizing processes and implementation of cybersecurity practices for contractors handling CUI.
Information System Security Officer (ISSO), CUIThe primary point of contact for all matters regarding the processing of CUI on an IT Resource.
SSP (System Security Plan)The formal document used to identify the protection measures to safeguard information being processed in a controlled unclassified environment.
Technology Control Plan (TCP)A customized management plan that outlines the physical, electronic, and procedural safeguards required to protect information, materials, or technology subject to contractual, regulatory, or sponsor-imposed restrictions. TCPs are used to implement controls related to CUI, CDI, export controls (ITAR/EAR), or other national security obligations.
This standard is issued in support of the policies on Information Security and Privacy (VII.B.8), Acceptable Use of IT Resources and Information Assets (VII.A.4) and Export Controls and OFAC Regulations (I.A.2), as amended or superseded.
November 1, 2025: This is the first standard to address this issues.
There are no appendices to this standard.