Information Technology Security Policy

PRINT DISCLAIMER: Official version of this document is accessible in the online policy library at https://policyoffice.ku.edu/. Printed copies may not reflect the most recent updates.

DOCUMENT TYPE:

Policy

PURPOSE:

This Information Security Policy (“Policy”) defines the security requirements that everyone who works or studies at KU Lawrence campus and all reporting units is expected to be familiar with and consistently follow. These security measures are set forth to avoid problems that affect the Confidentiality, Integrity, and Availability of information and systems at the University.

APPLIES TO:

This policy applies to all individuals who are issued a KU Online ID. This policy applies to any device owned by the University or any device used for University business by faculty, staff, students, and affiliates. This policy applies to any device that obtains an Internet Protocol (IP) address from the University.

CAMPUS:

Lawrence, Edwards, Parsons, Juniper Gardens, Yoder, Topeka

POLICY STATEMENT:

The KU Information Technology Security Office (ITSO) shall be authorized to evaluate the seriousness and immediacy of any threat to information resources and to take action to mitigate that threat, including disconnection of information resources. ITSO shall evaluate the impact of disrupting service when devising an action plan that mitigates any threat.

This policy is an important part of the University’s efforts to create a secure environment in which to carry out the mission of the University. Security requires the participation of each constituent who comes into contact with University information or systems.

This policy shall be supported by standards documents that set forth the detailed requirements that apply to individuals, devices, and systems. 

Responsibilities:

KU Information Technology Security Office

The KU Information Technology Security Office (ITSO) shall investigate Security Events and respond to Security Incidents in accordance with established procedures.

ITSO shall cultivate awareness of security issues and vulnerabilities within the University. All KU faculty and staff are required to complete annual security awareness training.

ITSO shall assist Internal Audit to assess risks to University systems as defined by Security Procedure: Risk and Vulnerability Assessments.

The Information Technology Security Office (ITSO) will determine the security specifications and standards for devices connected to the University data network. Devices connected to the University network will be reviewed on a regular basis for the latest operating system and application security patches applicable to that device as well as the latest anti-virus software. Devices not compliant with IT Security Office standards may be disconnected from the University network.

Information Technology Staff

All Information Technology staff must sign the Access to Confidential Data Agreement for University of Kansas Information Technology Employees.

Authorized Users of Information Technology

All authorized users share in responsibility for information security by following all applicable security policies and procedures.

Users must report any discovered unauthorized access attempts or other improper usage of KU information resources. Report observed or suspected violations to the IT Customer Service Center at 785-864-8080 or itcsc@ku.edu.

EXCLUSIONS OR SPECIAL CIRCUMSTANCES:

Variances to this Policy shall only be allowed if previously approved by the KU Information Technology Security Office and such approval is documented and verified by the Chief Information Officer.

CONSEQUENCES:

Faculty, staff, and student employees who violate this University policy may be subject to disciplinary action for misconduct and/or performance based on the administrative process appropriate to their employment.

Students who violate this University policy may be subject to proceedings for non-academic misconduct based on their student status.

Faculty, staff, student employees, students, and affiliates may also be subject to the discontinuance of specified information technology services based on the policy violation.

CONTACT:

Chief Information Officer
1001 Sunnyside Ave.
Lawrence, KS 66045
(785) 864-4999
kucio@ku.edu

APPROVED BY:

Provost and Executive Vice Chancellor

APPROVED ON:

2003-05-23 

EFFECTIVE ON:

2003-05-23

REVIEW CYCLE:

Annual (As Needed)

RELATED STATUTES, REGULATIONS, AND/OR POLICIES:

IT Security Incident Response Policy

Acceptable Use of Electronic Information Resources

RELATED PROCEDURES:

Policy and Procedures for Investigative Contact by Law Enforcement

Security Procedure: Risk and Vulnerability Assessments

DEFINITIONS:

Authorized users: (1) current faculty, staff, students, and affiliates of the University and (2) others whose temporary access furthers the mission of the University. Authorized users gain access to University resources through the hiring process, the student admissions process, designation as a University “affiliate”, or as a guest or vendor upon approval by a University administrator.

Security Event: A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.

Security Incident: A Security Event that is declared to be a Security Incident according to established procedure.

University affiliates: People and organizations associated with the University through some form of formalized agreement.

CHANGE HISTORY:

03/26/2025: Migration to TeamDynamix from Drupal.
05/22/2018: Clarified responsibilities of IT Security Office.
03/05/2015: Made update to Related Documents section.
10/07/2014: Updated to reflect current organizational requirements and consistency with ITEC7230A.
08/07/2009: Updated to reflect Legislative Post Audit requirements.

Was this helpful?
0 reviews
Print Article

Related Articles (23)

This policy outlines the expectations for the use of electronic information resources at the University of Kansas.
The purpose of the Data Center and Server Room Policy is to describe the minimum requirements for designing, installing, securing, monitoring, maintaining, protecting, and decommissioning a data center or server room at the University of Kansas.
The purpose of the Data Center and Server Room Standards is to describe the minimum requirements for designing, installing, securing, monitoring, maintaining, protecting, and decommissioning a data center or server room at the University of Kansas.
Information is a valuable University asset and is critical to the mission of teaching, research, and service to Kansans.Determining how to protect and handle information depends on a consideration of the information’s type, importance, and usage.Classification is necessary to understand which security practices should be used to protect different types of information. The more protected the information needs to be, the more practices are required.
This Procedures Guide for the University community was created to help you effectively manage information in your daily mission-related activities. Determining how to protect & handle information depends on a consideration of the information’s type, importance, and usage. These procedures outline the minimum level of protection necessary when performing certain activities, based on the classification of the information being handled. Classification is necessary to understand which security p
This GDPR- Privacy Notice is a supplement to the University’s General Privacy Policy and the GDPR Policy of the University of Kansas Medical Center (KUMC). This GDPR-Privacy Notice governs the capture, use, transfer, and storage of your personal data, as defined under the GDPR. This Privacy Notice will be provided to you whenever you provide personal data to the University or its affiliated entities, as applicable, and is available at: https://policy.ku.edu/This GDPR- Privacy Notice explains how
To provide the requirements for processing e-commerce transactions and any acceptance of credit card payments by administering entities for the University of Kansas Lawrence campus and its reporting units; to establish protocols to reduce the risk of exposure of cardholders’ personal financial information when such information is processed electronically through an e-commerce transaction; and to subject all e-commerce transactions to mandatory compliance with the Payment Card Industry (PCI) Data
Data confidentiality is an issue of legal and ethical concern. The purpose of this policy is to provide for proper cleaning or destruction of sensitive/confidential data and licensed software on all computer systems, electronic devices and electronic media being disposed, recycled or transferred either as surplus property or to another user.
To define appropriate use of electronic mail in the University
To ensure the security and integrity of university data and information assets as well as safeguard the information of its constituents. All Kansas University technology resources will adhere to a uniform access control standard and framework.
To assist University faculty and staff in responding to investigative contact by law enforcement officials.
The Information Technology (IT) Security Incident Response Policy defines the responsibilities of KU Lawrence campus and all reporting units staff when responding to or reporting security incidents.
The purpose of this policy is to define requirements for accessing University of Kansas (KU) computer systems containing sensitive data from both on and off campus. The standards set forth in this policy are intended to minimize potential security risks which may result from unauthorized use of KU computing resources. Multi-factor authentication adds a layer of security which helps deter the use of compromised credentials.
The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of password change.
To set forth requirements regarding information entrusted to the University by the public and members of the KU community.
Defines the philosophy and expectations regarding remote work to strategically facilitate continuity of business operations, ensure effective use of facility resources, and enhance the quality of work life for employees. 
The proper stewardship and custodianship of University administrative information will facilitate access to data that supports the work of those with official educational or administrative responsibilities within the institution, consistent with legal, ethical, competitive, and practical considerations.This document informs information stewards, managers, custodians, and users of data of their responsibilities.Note:  Nothing in this document precludes or addresses the release of institutional da
The procedure describes a framework for the assessment of potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic and paper data held by units of the University and outlines those items normally assessed in a University conducted Risk and Vulnerability Assessment.
To ensure the registration and collection of accurate information about all servers owned, operated or housed by the University of Kansas Lawrence campus and all reporting units and affiliated organizations, or servers that store data belonging to the University regardless of their location. This policy also describes the criteria for centralization of these systems into centrally administered data centers.
The purpose of the Systems Development Life Cycle (SDLC) Policy is to describe the requirements for developing and/or implementing new software and systems at the University of Kansas and to ensure that all development work is compliant as it relates to any and all regulatory, statutory, federal, and /or state guidelines.
The purpose of the Systems Development Life Cycle (SDLC) Standards is to describe the minimum required phases and considerations for developing and/or implementing new software and systems at the University of Kansas.
This policy covers the use of KU property to enable a telecommunications component on the Lawrence and Edwards campuses of the University of Kansas, regardless of location or placement on University buildings, towers or land, including that which is owned /operated by non-University entities but located on University property.
This policy outlines a uniform set of components, installation practices, processes, procedures and operational criteria, in order to manage (802.11x) wireless LAN systems and to ensure that these resources are used in a secure and efficient fashion.