SEHD Wiki

A source for policies, procedures, handbooks and other resources from the School of Education and Human Development

User Tools

Site Tools


policy:data_privacy:workstation_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
policy:data_privacy:workstation_security [2019/06/06 16:53] tonyromeropolicy:data_privacy:workstation_security [2019/06/13 17:26] (current) tonyromero
Line 5: Line 5:
 ==== University of Colorado IT Security Program Policy ==== ==== University of Colorado IT Security Program Policy ====
  
-All data and information resources of the SEHD are subject to University of Colorado's IT Security Program policy, [[https://www.cu.edu/ope/aps/6005|APS-6005]]. The policy states that all University IT users must:+All data and information resources of the SEHD are subject to University of Colorado's IT Security Program policy, [[https://www.cu.edu/ope/aps/6005|APS-6005]]. The policy states:
  
-> Ordinarily, Highly Confidential informationshall not be stored on workstations and mobile computing devices (laptops, flash drives, backup disks, etc.) unless specifically justified for business purposes and adequately secured. If Highly Confidential informationis stored on a workstation or mobile computing device or transmitted to an external network or organization, IT resource usersshall encrypt or adequately protect that information from disclosure. If Confidential information is stored on a workstation or mobile computing device or transmitted to an external network or organization, IT resource users shall adequately protect that information from disclosure. In addition to encryption, adequate protections may include the use of passwords, automatic logoffs, and secure Internet transmissions.+> Ordinarily, Highly Confidential information shall not be stored on workstations and mobile computing devices (laptops, flash drives, backup disks, etc.) unless specifically justified for business purposes and adequately secured. If Highly Confidential information is stored on a workstation or mobile computing device or transmitted to an external network or organization, IT resource users shall encrypt or adequately protect that information from disclosure. If Confidential information is stored on a workstation or mobile computing device or transmitted to an external network or organization, IT resource users shall adequately protect that information from disclosure. In addition to encryption, adequate protections may include the use of passwords, automatic logoffs, and secure Internet transmissions.
  
 ==== University of Colorado Denver HIPPA Policy ==== ==== University of Colorado Denver HIPPA Policy ====
  
-The most secure SEHD data are subject to the [[http://www.ucdenver.edu/research/Research Administration Documents/9.4 Workforce Security.pdf|UCD Workforce HIPPA policy]].+The most secure SEHD data are subject to the [[http://www.ucdenver.edu/research/Research Administration Documents/9.4 Workforce Security.pdf|UCD Workforce HIPPA policy]]. The policy states
  
-==== SEHD Secure Data Server Reporting ====+> Computer workstations accessing ePHI must maintain security configurations that restrict access to ePHI to only those workforce members that have been legitimately granted access. Recommended security configurations include, but are not limited to:
  
-Any individual that will report any known security related events as outlined in University of Colorado's IT Security Program policy related to the SEHD Secure Data Server or users of the data server to SEHDHelp@ucdenver.edu, OIT-RSS-Systems@ucdenver.edu, and oit-servicedesk@ucdenver.edu.+  * enabling a password protected screen saver; 
 +  * setting computers or applications to automatically terminate a computing session after a set period of idle time; 
 +  * the use of campus standard anti-virus products; and 
 +  * applying security patches to computer software applications and operating systems 
 + 
 +> UCD ITS will disconnect workstations from the network that pose a threat to UCD information systems due to a suspected policy violation, workstation intrusions, virus infestations, and other conditions which might jeopardize UCD information or work. 
 + 
 +> Workstations storing ePHI or that may be used to access ePHI must be located in areas with controlled access. An electronic audit trail of access must be maintained. It is the responsibility of unit administrators to establish and enforce a facility security plan to ensure access to workstations under their jurisdiction is restricted to authorized users. 
 + 
 +==== SEHD Secure Data Server ==== 
 + 
 +Any workstation that has access to the SEHD Secure Data Server must meet the requirements of the UCD HIPPA Policy.
  
  
policy/data_privacy/workstation_security.1559840025.txt.gz · Last modified: 2019/06/06 16:53 by tonyromero