Secure UD Glossary

Secure UD Glossary

The guide below provides definitions and related resources for the terms used in Secure UD. Use it to explore and learn more about Secure UD and what it offers the University.

Glossary

  1. Administrative controls
  2. Availability
  3. Checklist test
  4. Client system
  5. Confidentiality
  6. Council for Data Governance (CDG)
  7. Critical
  8. Criticality
  9. Data center
  10. Data custodian
  11. Data governance
  12. Data management
  13. Data Security Advisory Committee (DSAC)
  14. Data set
  15. Data steward
  16. Data stewardship
  17. Data trustee
  18. Disruptive event
  19. E-communications
  20. Electronic storage media
  21. End user
  22. Functional area
  23. Integrity
  24. IT device
  25. IT resource
  26. IT security incident
  27. Legitimate interest
  28. Level I information
  29. Level II information
  30. Level III information
  31. Local support provider (LSP)
  32. Mission critical
  33. Mobile device
  34. Non-critical
  35. Operational controls
  36. Portable device
  37. Privacy statement
  38. Recovery point objective (RPO)
  39. Recovery time objective (RTO)
  40. Remote access
  41. Risk area
  42. Risk management objective (RMO)
  43. Secure UD
  44. Secure UD Compliance and Risk Survey (Secure UD CARS)
  45. Secure UD Data Governance & Security Program (Secure UD DGSP)
  46. Secure UD Data Steward Guide
  47. Secure UD End User Acknowledgement
  48. Secure UD Toolkit
  49. Secure UD Inventory Tool
  50. Secure UD Security Plan Tool
  51. Secure UD Training
  52. Security control
  53. Security standard
  54. Server system
  55. Shared data repository
  56. Simulation
  57. Structured walkthrough
  58. Technical controls
  59. Technology service provider
  60. Unit
  61. Unit head
  62. Unit information security plan
  63. University Acceptable Use of IT Resources Policy
  64. University activities
  65. University-approved
  66. University Data Management and Governance Policy
  67. University E-Communications Privacy Policy
  68. University information
  69. University information classification
  70. University Information Classification Policy
  71. University Information Security Policy
  72. University Incident Response Policy
  73. University Web Privacy Policy
  74. Visitor

Secure UD Glossary

Term

Definition

More Information

    Administrative controls

    Security controls that focus on the management of risk and IT resources.

    Availability

    The timeliness and reliability of access to and use of University information.

    Checklist test

    A test in which a plan or procedure is reviewed to ensure accuracy and consistency.

    Client system

    Any IT device that is a desktop computer or laptop computer.

    Confidentiality

    The preservation of authorized restrictions on University information access and disclosure, including means for protecting personal privacy and proprietary information.

    Council for Data Governance (CDG)

    The University council responsible for overseeing the appointment and action of data stewards for each of the University's functional areas. It includes the Chief Information Officer, VP & General Counsel, and other members as appointed by the President and/or his or her delegates.

    Critical

    Important to the business continuity or operational effectiveness of the unit. Loss of integrity or availability of critical IT resources would have moderate short-term impact on business continuity or operational effectiveness.

    Criticality

    The combined integrity and availability concerns of University information. Criticality is a reflection of how important data is to business continuity or operational effectiveness.

    Data center

    A group of networked servers used for critical University activities involving data processing, storage, and transmission.

    Data custodian

    A University entity or employee with operational responsibility to manage a shared data repository on behalf of a data steward.

    Data governance

    The responsible oversight of the informational quality, effectiveness, usability, strategic value, and security of data throughout its lifecycle.

    Data management

    The responsible stewardship of data throughout its lifecycle, including acquisition, utilization, maintenance, access, and protection.

    Data Security Advisory Committee (DSAC)

    The University council responsible for coordinating information security and risk management efforts and monitoring and recommending necessary security actions to the University. It is chaired by the director of IT Security and includes delegates as may be appointed from time to time by data stewards and/or the chair.

    Data set

    A collection of University information used for a University activities.

    Data steward

    An individual within the University who is the primary institutional authority for a particular data set and who is principally responsible for the management and security of that data set across the institution.

    Data stewardship

    The responsible oversight of a data set, including principal responsibility for the establishment of standards and guidelines for appropriately managing and securing that data across the institution.

    Data trustee

    An executive officer of the University with the highest level of strategic planning and policy-setting authority and responsibility for a functional area.

    Disruptive event

    An event that requires the execution of a plan or procedure to recover from operational loss.

    E-communications

    The network traffic or files containing user's electronic communications, including telephone conversations, electronic mail or transmission, webpage, or content exchanged with other IP addresses.

    Electronic storage media

    Any standalone or integrated electronic media that can be used to store data. Includes optical media, magnetic media, disk drives, and flash drives.

    Functional area

    One or more units that have primary responsibility for managing a core University mission or function.

    Integrity

    The protection against improper modification or destruction of University information; includes non-repudiation and authenticity.

    IT device

    Any device involved in the processing, storage, or transmission of University information and making use of the University IT infrastructure or attached to the University network. These devices include, but are not limited to, desktop computers, laptop computers, personal digital assistants, server systems, network devices such as routers or switches, and printers.

    IT resource

    Any of the full set of University-owned or -controlled IT devices and data involved in the accessing, processing, storage, or transmission of information.

    IT security incident

    Any event that has or is likely to result in the compromise of the confidentiality, integrity, or availability of an IT resource, including, but not limited to, breaches or loss or theft of devices.

    Legitimate interest

    A requirement to access University information commensurate with an end user's conduct of official University activities.

    Level I information

    Also called Low Risk information; University information for which unintentional, unlawful, or unauthorized disclosure would have limited or no adverse effect on organizational operations, organizational assets, individuals, other organizations, or the nation.

    Level II information

    Also called Moderate Risk information; University information for which unintentional, unlawful, or unauthorized disclosure would have a moderate adverse effect on organizational operations, organizational assets, individuals, other organizations, or the nation.

    Level III information

    Also called High Risk information; University information for which unintentional, unlawful, or unauthorized disclosure would have a significant adverse effect on organizational operations, organizational assets, individuals, other organizations, or the nation.

    Local support provider (LSP)

    An individual or unit with primary responsibility for the installation, configuration, security, and ongoing maintenance of an IT device.

    Mission critical

    Vital to the business continuity or operational effectiveness of the unit. Loss of integrity or availability of mission critical IT resources would have significant short-term impact on business continuity or operational effectiveness.

    Mobile device

    Any IT device that is a mobile phone or tablet.

    Non-critical

    Necessary to the business continuity or operational effectiveness of the unit. Loss of integrity or availability of non-critical IT resources would have limited or no short-term impact on business continuity or operational effectiveness.

    Operational controls

    Security controls that are implemented primarily by people rather than by IT devices.

    Portable device

    Any IT device that is a laptop computer, mobile device, or removable electronic storage media.

    Privacy statement

    A posted notice of website practices for obtaining and using data from visitors to that website.

    Recovery point objective (RPO)

    The targeted maximum time period for which data might be lost as a result of a disruptive event before incurring unacceptable consequences associated with a break in business continuity. Simplified: the acceptable extent of data loss due to a disruptive event.

    Recovery time objective (RTO)

    The targeted duration of time and degree of business process resumption required following a disruptive event to avoid unacceptable consequences associated with a break in business continuity. Simplified: the acceptable duration of downtime following a disruptive event.

    Remote access

    Access to an IT resource through an off-network connection.

    Risk area

    One of 10 broad groups of IT security risks posed to the University.

    Risk management objective (RMO)

    One of 25 specific goals for managing and mitigating risk to the University.

    Secure UD

    The University's comprehensive, risk-driven information security initiative.

    Secure UD Compliance and Risk Survey (Secure UD CARS)

    A lightweight, streamlined unit compliance and risk assessment tool based on the requirements of the Secure UD DGSP.

    Secure UD Data Governance & Security Program (Secure UD DGSP)

    The University's comprehensive plan for IT and information-related information security and risk management.

    Secure UD Data Steward Guide

    A tool to assist data stewards in identifying, classifying, and defining protection requirements for the data sets from their functional areas.

    Secure UD End User Acknowledgement

    A written acknowledgement of every individual's responsibility to safeguard the confidentiality of University information in their care.

    Secure UD Inventory Tool

    A tool to assist units in inventorying their IT resources; contains both a business process and data inventory and an IT device inventory.

    Secure UD Security Plan Tool (Secure UD SPT)

    A tool to assist unit heads in developing and writing unit information security plans.

    Secure UD Toolkit

    A bundle containing the Secure UD tools and resources necessary for unit heads to begin implementing Secure UD within their units.

    Secure UD Training

    The University's modular, online, self-paced, comprehensive information security and awareness training program.

    Security control

    An administrative, operational, and/or technical requirement or recommendation for meeting security standards.

    Security standard

    A requirement for achieving risk management objectives and compliance with laws, regulations, and policies.

    Server system

    Any IT device that provides application, system, or network services to other information systems.

    Shared data repository

    A collection of University information to which multiple individuals or entities have access.

    Simulation

    A test in which a plan or procedure is executed during a mock disruptive event to ensure its function.

    Structured walkthrough

    A test in which a plan or procedure is reviewed step by step with the individuals responsible for its execution to ensure accuracy and consistency.

    Technical controls

    Security controls that are implemented primarily by IT devices according to their hardware, software, and firmware.

    Technology service provider

    A University unit or third-party vendor that provides online services for the University.

    Unit

    A University department, school, institute, program, office, initiative, center, or other operating unit.

    Unit head

    A University official with the highest level of authority over the day-to-day management or oversight of a unit's operation.

    Unit information security plan

    A document that describes a unit's requirements, including the security controls and processes, for compliance with the Secure UD DGSP and applicable laws, policies, regulations, and contractual obligations.

    University Acceptable Use of IT Resources Policy

    The University policy that establishes the governing philosophy and general rules for regulating use of the University's IT resources.

    University activities

    Actions, processes, and procedures that support University missions, administration, or operation. For the purposes of policy, University activities fo not include an individual's personal scholarship, pedagogy, or academic research.

    University-approved

    Either: required or permitted by a University contract; or approved by a unit head in the interests of facilitating the unit's administrative, operational, or technical ability to fulfill its missions or functions.

    University Data Management and Governance Policy

    The University policy that establishes the rules, roles, and responsibilities for data management at the University.

    University E-Communications Privacy Policy

    The University policy that establishes privacy requirements for e-communications and IT data.

    University information

    Any information from the University's purview, including information that the University may not own but that is governed by laws and regulations to which the University is held accountable. Encompasses all data that pertains to or supports the administration and missions, including research, of the University.

    University information classification

    Any of the three categories of University information that have different security requirements based on their potential impact due to a loss of confidentiality, integrity, or availability.

    University Information Classification Policy

    The University policy that establishes the University information classifications and requires that all University information be classified.

    University Information Security Policy

    The University policy that establishes a University-wide information security framework and the administrative, operational, and technical requirements for information security and risk management.

    University Incident Response Policy

    The University policy that establishes rules, responsibilities, and procedures for reporting, investivating, and responding to IT security incidents.

    University Web Privacy Policy

    The University policy that establishes requirements for posting privacy statements on University websites.

    Visitor

    Any user of a University website.