Skip to main content

Changes to Spring Academic Calendar Fordham is modifying its academic calendar in anticipation of a national resurgence of the COVID-19 pandemic this winter. Full Details

System and Communications Protection Policy

Version 1.0

Purpose

Fordham University adopted the System and Communications Protection security principles, established in the National Institute of Standards (NIST) SP 800-53 Revision 41 , to protect and safeguard the University’s IT Resources and for developing and maintaining a Systems and Communication Protection program to ensure compliance with minimally acceptable requirements.

Scope

This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • Data Owners and Custodians must develop/adopt and adhere to a formal, documented process to ensure that, commensurate with risk, the confidentiality, integrity, and availability of IT Resources, both in storage and during transmission, are protected per the Data in Transit and Data at Rest policies.
  • The process must protect and monitor information transmitted or received by critical IT Resources, employ architectural designs, software, development techniques, and engineering principles that promote adequate information security per Information Technology Security Policy.
  • Data Owners and Custodians must monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and critical internal boundaries of organizational systems per the Firewall/Network Access Control Policy.
  • Data Owners and Custodians must prevent unauthorized and unintended information transfer via shared IT Resources per Data Classification Policy and Guidelines.
  • Owners and custodians must prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks per IT Resources Remote Access Policy.
  • Data Owners and Custodians must employ Federal Information Processing Standards (FIPS) validated cryptography to protect the confidentiality of information per the Disk Encryption Policy.
  • Data Owners and Custodians must protect the authenticity of communications sessions, per the Server Certificate Security Policy.
  • Mandatory security controls for IT Resources are University-wide controls that are required to be consistently designed, implemented, monitored, and assessed by the University Information Security Office, as summarized in the Fordham IT Security Plan.
  • This policy and all associated standards and procedures, as well as their implementation effectiveness, must be reviewed annually and updated as needed.
  • Refer to the IT Policy Library for additional respective policies.

Definitions

Custodian is the individual to whom day-to-day actions have been assigned by the data owner and is responsible for the storage, maintenance, and protection of information.

Data Owner(s) are responsible for the information, security, and use of a particular set of information.

Federal Information Processing Standards (FIPS) are standards issued to establish requirements for various purposes, such as ensuring computer security and interoperability and are intended for cases in which suitable industry standards do not already exist. Many FIPS specifications are modified versions of standards used in the technical communities, such as the American National Standards Institute (ANSI), the Institute of Electrical and Electronics Engineers (IEEE), and the International Organization for Standardization (ISO).

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Related Policies and Procedures

Implementation Information

Review Frequency: Annual
Responsible Person: Director, IT Risk and Data Integrity
Approved By: CISO
Approval Date:  April 14, 2020

Revision History

Version: Date: Description:
1.0 04/14/2020 Initial document

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.