Data Ownership: Responsibilities & Procedures
Data Ownership: Responsibilities & Procedures
6
TAC 202 Language
7
TAC 202 Data Owner Responsibilities
12
UTS 165 Language
14
UTS 165 Responsibilities
15
− Owner of Mission Critical Information
Resources
• Designates an individual to serve as an
Information Security Administrator (ISA)
to implement information security
policies and procedures and for reporting
incidents to the ISO.
• Performs an annual information security
risk assessment and identifies,
recommends, and documents acceptable
risk levels for information resources
under his/her authority.
16
Data Classification
• To determine to what extent a resource
needs to be protected, the data which
resides on the system must be classified
• UT Tyler adopted UT Austin’s data
classification guidelines
• http://www.uttyler.edu/ISO/dataclassifi
cation.html
17
3 Categories of Data
18
Category I data:
• University data protected specifically by
federal or state law or University of Texas
at Tyler rules and regulations.
− Examples of Laws:
• FERPA
• HIPPA
• Texas Identity Theft Enforcement &
Protection Act
19
Examples of Category I data:
• Social Security number
• Credit Card Numbers
• Grades (including test scores,
assignments, and class grades)
• Personal vehicle information
• Access device numbers (building access
code, etc.)
• Biometric identifiers and full face images
20
More Cat I data:
21
Category II data:
• University data not otherwise identified
as Category-I data, but which are
releasable in accordance with the Texas
Public Information Act (e.g., contents of
specific e-mail, date of birth, salary,
etc.) Such data must be appropriately
protected to ensure a controlled and
lawful release.
22
Examples of Category II data:
• The calendar for a university official or
employee
• The emails of a university official or
employee containing sensitive
information
• Date of birth, place of birth of students
or employees
• Internal audit data
23
More Cat II data:
24
Category III data:
• University data not otherwise identified
as Category-I or Category-II data (e.g.,
publicly available).
25
Examples of Category III data:
• Departmental Web site
• Blogs
• Library data and holdings
• Public phone directory
• Course catalog and curriculum
information
• General benefits information
26
More Cat III data:
• Enrollment figures
• Publicized research findings
• State budget
• All public information
27
Road Map
To
Compliance
28
Compliant
8 Monitor/ensure compliance
2011 FY
7 Prepare/update disaster recovery
plans
6 Review and approve system access
periodically
5
Identify security controls based on risk
4 Complete annual/biennial risk
2010 FY assessments
3
Assign system custodian/sign acknowledgement
2
Assess and classify information
1
Training 29
2009-2010 (Now)
• Training (Done)
• Assess and classify information
Classify the data on your systems (Cat I,
Cat II, Cat III) & determine if mission
critical (to dept or institution)
Assign a monetary value to your system
(replacement value of system)
If you are able to assign a monetary value
to the data, that is even better (very hard
to do)
30
• Assign system custodian/sign
acknowledgement
Will do this at end of training
• Complete annual/biennial risk
assessments
Purchased Risk Watch
Surveys will be sent out
Will build on questions each year
31
2010-2011
• Update resource list and reclassify data
and value of assets as needed
• Identify security controls based on risk
(from previous year’s risk assessment)
• Review and approve system access
periodically
• Perform annual risk assessments if
mission critical resource
32
2010-2011 continued
• Prepare/update disaster recovery plans
(only if necessary)
• Monitor/ensure compliance
33