Audit and Accountability Policy

Version 1.2

For Students, Faculty, Staff, Guests, Alumni

Purpose

The purpose of this policy is to ensure best practices are followed for auditing the University’s IT Resources through the implementation, monitoring, management, and retention of auditable data.

Scope

This IT security policy, and all policies referenced herein, shall apply to all members of the University community, including faculty, students, administrators, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • Information Security and Assurance must approve the methods of implementing, monitoring, managing, and retaining auditable (e.g., logs) data.
  • The University’s Office of Information Technology must continually maintain or develop an approved documented program to monitor, manage, and review IT Resources and User activities.
  • The University’s Office of Information Technology must continually maintain or develop approved standards and processes to guide the implementation and management of logs per the Logging Requirements Policy.
  • The University’s Office of Information Technology must retain logs that meet University retention requirements per the Records Retention and Disposal Policy.
  • The logs must be consistent with University policies, applicable laws, regulations, and contracts.

Definitions

IT Resources include computing, networking, communications, applications, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and related materials and services.

Related Policies and Procedures

Implementation Information

Review Frequency: Biennial
Responsible Person: Senior Director of IT Security and Assurance
Approved By: CISO
Approval Date: March 30, 2020

Revision History

Version: Date: Description:
1.0 03/30/2020 Initial document
1.1 04/20/2022 Update policy statement
1.2 04/30/2024 Updated scope, disclaimer, and policy statement

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by Information Security and Assurance (ISA) will only be considered cooperatively between ISA and the requesting entity, with sufficient notice to allow for conducting appropriate risk analysis, documentation, review, and notification to authorized University representatives where necessary. Failure to adhere to ISA written policies may be met with University sanctions up to and including dismissal.

Need Help?


Walk-In Centers

McShane Center 266 | RH
Leon Lowenstein SL18 | LC

View Our Walk-In Hours