Audit and Accountability Policy
For Students, Faculty, Staff, Guests, Alumni
The purpose of this policy is to ensure best practices are followed for auditing the University’s IT Resources through the implementation, monitoring, management, and retention of auditable data.
This IT policy, and all policies referenced herein, shall apply to all members of the University community, including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
- Information Security and Assurance must approve the methods of implementing, monitoring, managing, and retaining auditable (e.g.logs) data.
- The University’s Office of Information Technology must develop an approved documented program to monitor, manage, and review IT Resources and User activities.
- The University’s Office of Information Technology must develop approved standards and processes to guide the implementation and management of logs per the Logging Standards Policy.
- The University’s Office of Information Technology must retain logs that meet University retention requirements per the Records Retention and Disposal Policy.
- The logs must be consistent with University and IT policies, applicable laws, regulations, and contracts.
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and related materials and services.
Related Policies and Procedures
- Change Control Policy
- Logging Standards Policy
- Log Review Policy
- Records Retention and Disposal Policy
|Responsible Person:||Senior Director, IT Security Operations and Assurance|
|Approval Date:||March 30, 2020|
|1.1||04/20/2022||Update policy statement|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the Information Security and Assurance (ISA) may only be done cooperatively between ISA and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Failure to adhere to ISA written policies may be met with University sanctions.