Volume VII: Information TechnologyChapter B: SecurityResponsible Executive: VP for Information Technology and Chief Information OfficerResponsible Office: Office of the Vice President for Information TechnologyDate Issued: November 1, 2017Date Last Revised: December 12, 2024
ContactsStatement of PolicyReason for This PolicyIndividuals and Entities AffectedExclusionsResponsibilitiesDefinitions (defined terms are capitalized throughout the document)Related Documents, Forms and ToolsWebsite Address for This PolicyHistory and UpdatesAppendix
Purdue Systems Security765-494-4000 | itpolicyanswers@purdue.edu
A trusted and effective information technology (IT) environment is vital to the University’s ongoing mission of discovery, learning and engagement. To this end, the University will:
All individuals who use or have access to Information Assets and IT Resources, regardless of the user’s role or affiliation with the University, are expected to act in accordance with this policy and its supporting Information Security and Privacy Program, as well as all relevant laws, contractual obligations and the highest ethical standards. Violations may result in disciplinary actions up to and including expulsion or termination or may be referred to appropriate external authorities.
Information Assets and IT Resources are essential to furthering the mission of Purdue University. These are University assets, or those entrusted to it by affiliates, that must be protected throughout various phases of their useful life, including when created or collected, stored, transmitted or transferred, and ultimately destroyed. To accomplish this objective, certain administrative, technological and physical safeguards must be in place to adequately protect Information Assets and IT Resources, while supporting their use in furthering Purdue’s mission. The Responsibilities outlined in this policy establish and define the organizational structure by which such safeguards are identified, promulgated, implemented and maintained.
All individuals who use or have access to Information Assets and IT Resources are affected and governed by this policy and its supporting standards and procedures.
None.
Vice President for Information Technology and System Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Data User
Data Steward
Information Owner
Information Security Governance Committee
IT Security Officers Working Group
University Faculty, Staff and Students, and Other Parties with Access to University Information Assets and IT Resources
All defined terms are capitalized throughout the document. Additional defined terms may be found in the central Policy Glossary.
DataDiscrete, objective facts, statistics or other information collected or captured for reference, analysis, calculation, measurement or some other use.
Data StewardAn individual assigned by an Information Owner to facilitate the interpretation and implementation of Data policies, standards and procedures.
Data UserAn individual who needs and uses Information Assets on a daily basis as part of their assigned employment duties or functions.
Device(s)Any mechanism used to store, retrieve, manipulate, or transfer Data, including but not limited to, a desktop or laptop computer, CD, USB flash drive, external USB hard drive, tablet, smart phone or cellular phone.
Information AssetA body of contextualized or definable Data, regardless of format, that has a recognizable and manageable value, risk, content and lifecycle and that is generally defined, classified and managed by the University so that it can be understood, shared, protected and used effectively. In the ordinary course of its activities, the University regularly creates, collects, maintains, uses and transmits Information Assets.
Information OwnerThe unit administrative head who is the decision-maker with respect to Information Assets owned by that unit in conducting University business. Except in cases where unit-level control would impede the general usage of information in the University’s mission of discovery, learning and engagement, an Information Owner has decision-making authority over the Information Assets used, managed or regularly accessed in the unit’s administrative functions, as well as over any forms, files, information and records, regardless of format, that relate to such Information Assets.
Information Security Governance CommitteeA committee of individuals who, due to the nature of their positions within the University, have responsibility for oversight of an Information Asset that is subject to compliance with state or federal laws and regulations and/or contractual obligations related to information security and privacy.
IT Resources (or Information Technology Resources)All tangible and intangible computing and network assets provided by the University or by authorized third-parties, regardless of whether those resources or assets are accessed from on-campus or off-campus locations or via Devices. Examples of such assets include, but are not limited to, hardware, software, wired and wireless network and voice telecommunications assets and related bandwidth, mobile Devices, electronic and hardcopy information resources, and printers.
IT Security Officers Working GroupA group of individuals who have been designated as the security officer for their IT unit or campus.
Information Security and Privacy Program
Acceptable Use of IT Resources and Information Assets (VII.A.4)
Statement of Integrity and Code of Conduct
Related standards:
www.purdue.edu/vpec/policies/information-technology/viib8
December 12, 2024: Document reviewed; minor administrative updates made to titles, offices and links.
January 22, 2018: Term “Data Custodian” changed to “Data User.”
November 1, 2017: This policy supersedes Data Security and Access Policy (Executive Memorandum No. C-34), dated November 11, 1994, Data Classification and Governance (VII.B.6), dated November 18, 2011, and Delegation of Administrative Authority and Responsibility for Information Assurance, Security and Awareness (WL-4), dated November 18, 2011.
There are no appendices to this policy.