SEHD Wiki

A source for policies, procedures, handbooks and other resources from the School of Education and Human Development

User Tools

Site Tools


policy:data_privacy:access_contro

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
policy:data_privacy:access_contro [2019/03/28 19:29] tonyromeropolicy:data_privacy:access_contro [2019/06/13 17:29] (current) tonyromero
Line 1: Line 1:
-====== Access Control, Minimum Necessary Access and Verification for Access to Data ======+====== Access Control ======
  
-a. APS-6005[[https://www.cu.edu/ope/aps/6005  b. University HIPAA Policy http://www.ucdenver.edu/research/ORC/HIPAA/Pages/Policy.aspx|https://www.cu.edu/ope/aps/6005]]\\ +==== University of Colorado IT Security Program Policy ====
-b. University HIPAA Policy [[http://www.ucdenver.edu/research/ORC/HIPAA/Pages/Policy.aspx|http://www.ucdenver.edu/research/ORC/HIPAA/Pages/Policy.aspx]]+
  
-===== Sub Heading =====+All data and information resources of the SEHD are subject to University of Colorado's IT Security Program policy, [[https://www.cu.edu/ope/aps/6005|APS-6005]]. Within the policy it describes the requirement of minimum necessary access to data:
  
-:!: **Important: **Lorem ipsum dolor sit ametconsectetur adipiscing elit. Aenean eu eleifend orcivel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massaauctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed loremPellentesque eu dictum sem.+> Although studentsfacultyand staff require access to University information resources for academic and business purposesthis access must be limited to what is needed for his/her workUse of resources beyond that which is authorized results in unnecessary risks to University information with no corresponding academic or business value.
  
-**Note:** Lorem ipsum dolor sit amet, consectetur adipiscing elit. +==== University of Colorado Denver HIPPA Policy ====
-===== Headline =====+
  
-Lorem ipsum dolor sit ametconsectetur adipiscing elitAenean eu eleifend orci, vel scelerisque nisiPraesent finibus euismod auctorCras leo massa, auctor eu cursus nec, volutpat eu sapienCras mollis euismod diam, eu viverra elit ornare sit ametMauris vel dolor vel magna molestie eleifend tempor vitae massaPhasellus at lacus libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem.+As applicablethe most secure SEHD data are subject to the UCD Workforce [[http://www.ucdenver.edu/research/Research Administration Documents/9.4 Workforce Security.pdf|HIPPA policy 9.4]]The policy describes what must be included in unit's access control procedures.
  
-----+> The UCD Information Technology Services Department (ITS) offers central disk storage and backup services which many departments and units use for maintaining their data. While central ITS systems meet the HIPAA physical security and contingency planning requirements, departments and units must still take care to address controls for workstation security, account management, and controlling access to ePHI they create or house.
  
-===== Various Underlines =====+==== Access to the SEHD Secure Data Server ====
  
-Lorem ipsum dolor sit ametconsectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem.+Only appropriately identifiedvalidated and authorized individuals will have access to the SEHD Secure Server.
  
-===== List Items =====+To gain access a user must complete the following.
  
-  - One +  * The user completes and documents their completion of the required security trainings. 
-  - something +  * The user reads and signs the SEHD Secure Data Server Access Agreement 
-  - three +  * The user's supervisor or sponsor reads and signs the SEHD Secure Data Server Supervisor/Sponsor Agreement 
-  - eleven +  * The user completes the SEHD Secure Data Server Access Form. The form will require that the user provides the minimum necessary data they will need to perform their task.
-  - five hundred((I'm adding a footnote to this list item, it will show up at the bottom.))+
  
-Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem.+A data user's supervisor or sponsor will
  
-----+  * Re-evaluate access rights when a workforce member’s access requirements change and e-mail the Data Governance Manager if necessary to modify the user's access. 
 +  * Contact the Data Governance Manager in the event the data user's employment or affiliation with SEHD has ended.
  
-==== Slightly Lower Header ====+The Data Governance Manager will
  
-|We can also use tables|for describing various policies| +  * Review the user's required trainings, SEHD Secure Data Server Access Agreement, SEHD Secure Data Server Supervisor/Sponsor Agreement, and the SEHD Secure Data Server Access form. 
-| | | +  * Grant, modify, or terminate the user's access to the SEHD Data Server. 
-| | | +  * Send an e-mail with the decision to the data user, the data user's supervisor, SEHD HR, and SEHD IT. 
- +  * Remove the data user's access in the event the data user's employment or affiliation with SEHD has ended. 
-\\+  * Remove the data user's access in the event of a breach that endangers the security of the Data Server. 
 +  * On an annual basis review all user's that have access and modify or remove access as necessary. 
 +  * Maintain an auditable trail of requests, modification of access rights, and termination of access to the SEHD Secure Data Server.
  
  
policy/data_privacy/access_contro.1553801386.txt.gz · Last modified: 2019/03/28 19:29 by tonyromero