Ohio Administrative Code
Title 3356 - Youngstown State University
Chapter 3356-4 - University Property and Use of Equipment
Section 3356-4-13 - Sensitive information/information security

Universal Citation: OH Admin Code 3356-4-13

Current through all regulations passed and filed through September 16, 2024

(A) Policy statement. Youngstown state university ("YSU" or "university") creates and maintains sensitive information as part of normal operations. Appropriate safeguards and procedures protect the integrity, availability, and confidentiality of sensitive information. All university employees and individuals who have access to sensitive information have a responsibility to properly handle and secure such information.

(B) Purpose. To establish guidelines for the identification and safeguarding of sensitive information (i.e., information that should not be disclosed within or beyond Youngstown state university without proper authorization and safeguards).

(C) Scope. This policy applies to university employees (including student employees, customers, volunteers, vendors, contractors, board members, university affiliates, and any others who use or are granted access to university sensitive information.

(D) Definitions and information classifications (for the purposes of this policy).

(1) "Sensitive information." Information that the university has a legal, regulatory and/or business interest obligation to protect. Sensitive information transcends the medium on which it is stored or communicated and is sensitive regardless of whether it is in verbal, paper, electronic, or any other format.

(2) "Personal information." Highly sensitive information that the university is required to protect often due to governing laws, including Family Educational Rights and Privacy Act ("FERPA"), the Gramm-Leach-Bliley Act ("GLBA"), the Health Insurance Portability and Accountability Act ("HIPAA"), and payment card industry data security standard ("PCI DSS"). Compromise of personal information has specific negative consequences and requires that the university take specific actions. This category encompasses information not freely available that can be associated with a particular individual, including:
(a) Social security number.

(b) Credit card numbers.

(c) Driver's license number.

(d) Date and place of birth.

(3) "Confidential information." Sensitive information having different degrees of sensitivity but still requiring that confidentiality must be maintained. Included is information that must be very closely safeguarded, such as:
(a) Trade secrets.

(b) Employee benefit information.

(c) Student information (non-directory).

(d) Account passwords/personal identification numbers ("PINS").

(e) Digitized signatures.

(f) Encryption keys.

(g) Medical records.

(4) "YSU public information." Information that has been specifically declared and approved as public by YSU. It includes information such as student directory information to the extent permitted under FERPA or records approved as public by the general counsel's office in response to a public records request.

(E) Requirements.

(1) Sensitive information must be physically secured when not attended.

(2) Sensitive information stored or transmitted electronically must be encrypted.

(3) Sensitive information cannot be shared with unknown individuals claiming YSU association, who self-identify or reference known YSU individuals to establish their identity unless those references are checked.

(4) Communication of sensitive information by an employee requires proper procedural safeguards and the written preapproval of the department supervisor/chair and division officer/dean.

(5) Physical removal of sensitive information from YSU or its facilities requires proper procedural safeguards and the written preapproval of the department supervisor/chair and division officer/dean.

(6) Storage of YSU-related sensitive information on personally owned electronic devices by an employee requires proper procedural safeguards and the written preapproval of the department supervisor/chair and division officer/dean.

(7) All YSU employees are required to attend sensitive information and information security training.

(8) Information technology services is responsible for establishing and maintaining university information security standards, manuals, and trainings.

(F) Procedures.

(1) Take stock. Assess information in all formats to identify sensitive information. This is a responsibility of all employees having YSU-related information access.

(2) Scale down. Keep only the information required to perform your job responsibilities and as identified by the YSU records retention procedure. The need to store and/or communicate sensitive information requires written approval using the "Highly Sensitive Information Storage Request" form.

(3) Lock it. Protect sensitive information in your care through actions including the following:
(a) Physically secure the information (e.g., lock physical spaces such as offices, cabinets, desks). Secure computers and other data storage devices with locks.

(b) Encrypt the information when it is stored electronically.

(c) Use only secured methods for transmitting sensitive information. (Note: email, internet, web and wireless transmissions are not secure for sensitive information by default, but steps can and must be taken to secure these methods of delivery.)

(d) Verify the requester's identity and validity of requests for sensitive information communications.

(4) Pitch it. Properly dispose of information not required to perform job duties. Proper disposal techniques include shredding or securely erasing electronic files. Note that deleting files electronically and/or simple reformatting of electronic media are not proper disposal techniques.

(5) Plan ahead. Take positive measures to ensure proper response to potential sensitive information incidents. For example, know and document who has been granted access to what sensitive information. Have appropriate software installed on computers, cell phones, and other devices. Identify appropriate notification paths to pursue if sensitive information is compromised (including the office of the general counsel if personal information is compromised). Use change in responsibilities and resources as an opportunity to begin again at paragraph (F)(1) of this rule as part of continuous quality improvement planning.

Disclaimer: These regulations may not be the most recent version. Ohio may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.