Text Size Default Text SizeDefault Text Size Large Text SizeLarge Text Size Largest Text SizeLargest Text Size Print Print this Page

Policy 6141

University Information Technology Security Program

I. Purpose

Longwood University has a highly complex and resource rich information technology (IT) environment upon which there is increasing reliance to provide mission-critical academic, instructional and administrative functions. Safeguarding the institution's computing assets in the face of growing security threats is a significant challenge requiring a strong, persistent and coordinated program that leverages widely accepted, effective security practices appropriate for the higher education environment. This policy states the codes of practice with which the university aligns its IT security program.

The Commonwealth of Virginia Restructured Higher Education Financial and Administrative Operations Act of 2005 grants institutions additional authority over financial and administrative operations, on condition that certain commitments to the Commonwealth are met. Chapters 824 and 829 of the 200 Virginia Acts of the Assembly and Longwood's Memorandum of Understanding with the Commonwealth provides full delegated responsibility for management of the institution's IT security activities. This delegation includes the authority to conduct these activities in accordance with industry best practices appropriately tailored for the specific circumstances of the university, in lieu of following Commonwealth-determined specifications. This policy documents the industry best practices with which the university will align its security activities.

II. Policy


The University's IT security program will be based upon best practices recommended in the "Code of Practice for Information Security Management" published by the International Organization for Standardization and the International Electrotechnical Commission (ISO/IEC 27002:2005), appropriately tailored to the specific circumstances of the university. The program will also incorporate security requirements of applicable regulations, such as the Family Educational Rights and Privacy Act, Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act. Professional organizations, such as the national EDUCAUSE association and the Virginia Alliance for Secure Computing and Networking, will serve as resources for additional effective security practices.

III. Procedures

The ISO/IEC 27002:2005 Code of Practice and other sources noted in the policy statement will be used to guide development and ongoing enhancement of additional IT security policies as needed. All University policies governing IT security shall be available from the Administrative Policies and Procedures Manual with additional policies, standards and guidelines maintained internally by Information and Instructional Technology Services.

Approved by the Board of Visitors, September 11, 2009.