(1) Device requirements
All devices must meet the following requirements:
(a) Software and hardware updates
Devices used to access, store, transmit, or receive data for
which the university has an obligation to maintain confidentiality must use
operating system and application software that is eligible and configured to
receive ongoing security updates from its vendor. Devices with unsupported or
end-of-life "EOL" software may be denied access to the university network.
Users with devices not owned or issued by the university may seek assistance
from information technology for configuration if the intended use of the device
is for university business.
(b) Device registration
The university may require a device to be registered with the
university's management tools prior to it being granted the ability to access,
store, transmit, or receive data for which the university has an obligation to
maintain confidentiality. Access, storage, transmission or receipt of data for
which the university has an obligation to maintain confidentiality confers
consent to the university to manage the registered device, including
enforcement of security settings such as inactivity timeouts, personal
identification number "PIN" or password strength requirements, remote device
tracking features, remote lock and device wipe features, and other security
features available on the device.
Except for designated guest networks, all devices
must
have the device's media access control "MAC" address registered with the
information technology department in order to access the university network.
Any device without a registered MAC address may be removed from the
network without
notice.
(c)
Anti-virus/anti-malware protection
To limit risk to university data from malicious software, all
devices based on the microsoft windows operating system platform used to
access, store, or transmit, or receive data for which the university has an
obligation to maintain confidentiality must have an installed and operating
anti-virus software with definitions not more than seven days old. Anti-virus
protection is recommended on other operating system platforms, such as apple mac-os, linux, or
tablet/smartphone mobile device operating systems. Information technology
provides guidance and limited support on anti-malware software for
non-university of Toledo "UT" issued devices if the intended use of the device
is for university business.
(d) Encryption of data at rest
Strong encryption is required to render unusable, unreadable,
or indecipherable the following categories of data while stored on devices or
nonvolatile media:
(i) Medical and
health information, including electronic protected health information "ePHI",
as defined by the Health Insurance Portability and Accountability Act of 1996
"HIPAA" and related regulations.
(ii) Cardholder data
as defined by
the payment card industry security council's data security standards,
"PCI-DSS."
(iii) Certain personally
identifiable information "PII" when combined with an individual's name or date
of birth, including:
(a) Government
identification numbers such as social security numbers "SSNs," passport
numbers, state identity document numbers, or driver's license
numbers;
(b) Banking or financial
account numbers and related account data.
(iv) Any other data for which the university
has an obligation or incentive to encrypt.
Encryption is highly recommended but not required for devices
not purchased, owned, or issued by the university so long as the device does
not store the categories of data listed in this paragraph. The information
technology department provides guidance and limited support on encryption
software for non-UT issued devices if the intended use of the device is for
university business.
Exceptions for devices where no feasible encryption technology
exists may be made on a case by case basis and may be subject to compensating
controls established by the university CIO/CTO or
designee.
(e)
Physical security
All devices must be reasonably secured against loss, theft, and
inappropriate access. Devices which access, store, transmit, or receive data
for which the university has an obligation to maintain confidentiality must be
physically situated in a manner that prevents viewing of confidential data by
individuals who are not authorized to view the data. Unlocked devices may not
be left unattended while authenticated to the university network.
(f) Operating system inactivity
lockouts
Devices used to access, store, or transmit, or receive data for
which the university has an obligation to maintain confidentiality must have a
reasonable and appropriate operating system inactivity lockout feature
enabled.
(g) Network
security
All devices which access, store, transmit, or receive data for
which the university has an obligation to maintain confidentiality must be
configured with a basic host firewall or reasonable substitute.
(h) Logging; consent to audit
All devices which access, store, transmit, or receive ePHI or
cardholder data or other sensitive data, must
have available vendor default application and security logging enabled, and
such devices must be made available to university administration for
investigation, inspection, and audit upon request.
(i)
Accessing data -
users are entitled to access only those elements of IT systems that are
consistent with their specific authorization.
(j) Disposal
When disposing of a device, the owner must make a reasonable
effort to erase or remove all university of Toledo information from the
device.
(k) Loss, theft, damage
The university of Toledo is not responsible for damage, loss,
or theft of devices not owned by the university. Lost or stolen devices with
access to university information systems or containing data for which the
university has an obligation to maintain confidentiality must be reported to
university of Toledo information technology help desk as soon as practicable,
by telephone at (419) 530-2400 or (419) 383-2400, or by e-mail at
ithelpdesk@utoledo.edu.
(2) Workstation requirements
In addition to the requirements for general devices set forth
in this paragraph, university workstations must also meet the following
requirements:
(a) Workstation baseline
image. To enhance the security and supportability of the university's computing
infrastructure, standard device operating system and software images supplied
by information technology are mandatory for initial deployments of all
university-issued workstations. Workstations requiring a custom or nonstandard
image are subject to review and approval by information technology, and are
supported on a best-effort basis.
(b) Domain authentication. The university of
Toledo's active directory "UTAD" domain is the foundation of the university's
network security and network management capabilities. Except as directed by the
vice president, CIO/CTO or designee, all university issued workstations that
have the technical capability to authenticate to the UTAD domain must do so
when present on the university's network.
(c) Anti-virus/anti-malware protection.
Antivirus software is a fundamental component of network and workstation
security. All university issued workstations must have an installed and
operating antivirus software with definitions not more than three days old.
Antivirus software is provided by information technology department for all
university issued workstations in the standard workstation image.
(d) Encryption. All university workstations
must use encryption technology to secure data at rest except as otherwise
directed by the university's vice president CIO/CTO or
designee.
(i) The workstation encryption
mechanism standards are determined by the vice president VIO/CTO
or designee based on a risk analysis;
(ii) Encryption algorithm and key length
standards are determined by the vice president CIO/CTO or designee based on a risk
analysis;
(iii) The
vice president
CIO/CTO or designee shall publish and update the workstation encryption
standards as appropriate from time to time.
(e) Physical security. All university
workstations must be reasonably secured against loss, theft, and inappropriate
access. Devices which access, store, transmit, or receive any data for which
the university has an obligation to maintain confidentiality must be physically
situated in a manner that prevents viewing of confidential data by individuals
who are not authorized to view the data. Portable workstations must be
reasonably secured at all times and extra care must be taken to prevent loss or
theft of the device. Lost, stolen, or damaged workstations must be reported to
the information technology department as soon as possible.
(f) Workstation user authentication.
Workstations used to access, store, or transmit, or receive data for which the
university has an obligation to maintain confidentiality must have reasonable
and appropriate workstation user authentication features enabled. The following
controls may be enabled at the direction of the information security office:
(i) University workstations are configured to
use the UTAD active directory login to authenticate a user to the workstation
and to the university network.
(ii)
University workstations in clinical environments and other appropriate areas
are additionally configured with a single sign on technology determined by the
vice president
CIO/CTO or designee, based on a risk analysis.
(iii) Configuration and use of workstation
automatic logon and logoff features are determined by the
vice president
CIO/CTO or designee based on a risk analysis, in consultation with the
affected department.
(iv)
Workstation screen saver activations and session idle timeouts are determined
by the vice
president CIO/CTO or designee, in consultation with the affected college
or department, and are based on a risk analysis.
(a) The default operating system idle timeout
for all clinical workstations is five minutes.
(b)
Workstations used to access, store, transmit, or
receive ePHI may
be extended to a fifteen minute idle timeout
by request and completion of a risk analysis by the
information security office.
(c)
The maximum operating system idle timeout for workstations used to process or
transact in cardholder data is fifteen minutes. Idle timeouts for workstations
with access to cardholder data may not be extended beyond fifteen
minutes.
(d) The default operating
system idle timeout for all other workstations used to access, store, transmit,
or receive data for which the university has an obligation to maintain
confidentiality is twenty minutes unless otherwise arranged with the affected
college or department.
(e) The
default operating system idle timeout for all other workstations is one hour,
but may be extended upon user request.
(f) Workstations that are not used to access,
store, transmit, or receive data for which the university has an obligation to
maintain confidentiality and workstations provided for public use may be
configured with nonstandard idle timeouts, as appropriate. In some situations,
compensating controls may be required by the university
vice president CIO/CTO or designee ISO to limit the
risk of malicious activity.
(v) Configuration and use of workstation
locking mechanisms is determined by the vice president CIO/CTO
or designee, in consultation with the affected department, and is based
on a risk analysis. By default, all clinical workstations require user
authentication prior to deactivating an operating system screen
saver.
(vi) The
vice president CIO/CTO or designee shall publish and
update the workstation user authentication standards as appropriate from time
to time.
(g) Local
administrator access. University information technology "IT"
staff must have the ability to gain local
administrator access to all workstations regardless of operating system, and
regardless of the ownership of the workstation. By default, users are not
granted administrator access to workstations except as necessary. Users with a
business need for elevated access to a specific workstation may submit an IT
help desk request the
appropriate level of access.
(h)
Data backup. Users are responsible for maintaining accurate and secure backups
of any data stored locally on workstations. The university does not back up
individual workstations and is not responsible for the incidental loss of data
stored on workstations. The university strongly recommends that a copy of such
data be kept
using UToledo provided resources such
as one drive, teams, sharepoint or z drive share.
(i) Disposal. Disposal of university
workstations must comply with all university workstation disposal and
decommissioning policies and standards, including the university's technology
asset management policy.
(3) Supported hardware and software
(a) Supported hardware. Hardware vendors are
evaluated and recommended by appropriate means for financial stability,
research and development activities, strong quality assurance, advanced testing
programs, and strong support from third-party suppliers, among other factors.
For a list of vendors that are currently supported by the information
technology department, contact the IT help desk. If a department chooses to
purchase hardware from a vendor other than those supported by IT, the equipment
may not be provided access to the university network.
(b) Supported software. Information
technology has identified a list of supported software for workstations:
(i) Operating systems. Supported operating
systems include current vendor-supported versions of microsoft windows, apple
mac os, apple ios, android, and enterprise linux distributions. Except in cases
where paid vendor support is available, other operating systems are supported
on a best effort basis, and access to university resources from assets using an
unsupported operating system is not guaranteed.
(ii) Enterprise applications. Requests for
new enterprise or clinical applications are reviewed via the procurement
process. A list of currently supported enterprise applications is maintained by
information technology.
(iii)
Licensed software. Information technology maintains institutional licensing for
a broad range of academic, business, clinical, and research related software.
Software with limited licensing quantities or licensing purchased within
departments may be restricted to functional areas, departments or
individuals.
(4) Prohibited activities
The following activities are prohibited:
(a) Destruction, alteration, damage, or
unauthorized modification of workstation hardware without prior approval by
information technology.
(b) Hosting
of network services on devices attached to the university network (e.g.,
dynamic host configuration protocol "DHCP," wireless access points, routers,
switches, etc.) without the prior review and approval by information
technology.
(c) Circumvention of
workstation security controls, including:
(i)
Disabling anti-virus or other security software;
(ii) Disabling or circumventing workstation
encryption software;
(iii)
Disabling or modifying workstation idle timeouts and lockouts.
(iv)
Disabling or
modifying IT management software.
(d) Circumvention of network security
controls, including:
(i) Internet protocol
"IP" or "MAC" address manual assignment without prior review and approval by
information technology.
(ii)
Circumventing network firewalls, proxy servers, and intrusion detection and
prevention devices.
(iii) Unauthorized
monitoring of the university network.
(e) Use of a workstation for illegal
activity, including unauthorized hacking, cracking or intrusion of university
or third party devices, systems, or networks.
(f) Storage, processing, transmission,
receipt, or access to information for which the university has an obligation to
maintain confidentiality on a device or workstation in violation of the
requirements of this policy.
(5) Compliance and audit
In the event of a security incident or alleged breach, the
university has the authority to investigate and identify any data involved
involving workstations, and to the extent possible, fulfill the university's
obligations to mitigate the effects of the incident. Use of the university
network constitutes consent to provide access to a device in this regard,
including making the equipment available to audit and investigation by
university personnel.
(6)
Violations
Violations of this policy will be subject to the university's
disciplinary process and may result in disciplinary action up to and including
termination. Minor violations will result in removal of the offending device
from the university network at the discretion of information technology or
administration. Criminal activity subject to applicable state and federal
criminal penalties may be referred to law enforcement as appropriate.