Information Security | Information Technology. New Device Data Classification Systems. New Standards. Other Resources. Supporting Information. Tools. The University continually develops, maintains and improves its information technology (IT) infrastructure and applications to support the creation, storage, modification and sharing of data. These IT systems are essential to the efficient and effective operation of the University. The University, therefore, has a responsibility to institute appropriate safeguards to keep its IT systems and information assets secure.
In addition, the University must comply with various regulatory requirements that are also designed to keep certain types of data secure and confidential. The security of IT systems and information assets is dependent on the individuals managing as well as the individuals utilizing such resources. The University is committed to supporting the principles of academic freedom and the free exchange of ideas and the University's information security policies and programs are intended to support those principles while still maintaining an appropriate level of security. The goals of this security program are to: Protect the University's IT systems and information assets from unauthorized access, alteration, disclosure or destruction. Ensure the reliability and availability of the University's IT systems and information assets.
Ensure the privacy of faculty, staff and student information and that of other University customers or associates. Identify and prevent identity theft. Protect the reputation of the University and ensure compliance with federal and state laws and regulations. Establish resources and guidelines that allow all individuals within the University community to practice good data stewardship.
Reviewed February 2.
Information Management and Information Technology Management. Objectives. The objectives of. General. 12. 2. 1. Principles. Information management. Best practice policies and standards. Information technology constitutes the full spectrum of technologies and. The Government Chief Information.
Officer (CIO) is responsible for the corporate management of information. The principles underlying effective management. IM/IT Governance As Chief Information Officer and technology strategist for major government.
CPPM chapter 2 section 2. Central Agency Policy. Responsibility Areas) the Office of the Government CIO is the central.
Develop Information Technology policies and procedures using Word Templates to address your IT (information technology) management needs like IT security, computer.
British Columbia responsible for Chapter. The policies contained in this section should be considered in conjunction. The Office of the. Government CIO also maintains four major manuals that support the Core. Policy and Procedure Manual (CPPM) Chapter 1. They are the. Information and.
Technology Manual (Supplement to CPPM Chapter 1. Freedom of Information. Protection of Privacy Policy and Procedures Manual; Recorded Information.
OFFICE OF INFORMATION TECHNOLOGY Policies and Procedures Manual 1.1.2.2. To protect the integrity, security, and confidentiality of data and/or. UBC Information Security Manual. Table of Contents. include information assets, software assets and information technology equipment. In addition, the. ISACA® is a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance. Information Security Introduction. The University continually develops, maintains and improves its information technology (IT) infrastructure and applications to.
Management Manual; and. Information Security.
Policy. Additionally there. Government CIO's. In May 2. 00. 6 Cabinet. Mandate[d] the Chief Information Officer with governance authority. Province's information. The following authorities, responsibilities.
The Australian Government Information Security Manual (ISM) is used for the risk-managed protection of information and systems. California state university, long beach information technology services security manual revised august 1997 information technology services table of contents. Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification. The Security Incident Handling Procedure details the steps for reporting any actual or suspected IT security problem. . Management Manual; and; Information Security. the areas of information and technology management. Information and Technology Security.
Government CIO and new ones that have been developed as part of the Government. CIO's Governance Working Group's work. They also include authorities. Ministries and/or Ministry. CIOs in the past version of this chapter as well as those recommended. Government CIO's Governance Working Group. Government Chief.
Information Officer The Government CIO develops, proposes, and maintains corporate- wide IM/IT. Areas associated. Governance and Policy: a) Legislation.
Recommends legislation. Ensures the legislated.
Personal Information Directory summaries in the Personal Information. Directory are maintained.
Policies, Procedures. Standards. Proposes corporate. IM/IT architecture and related policy, procedures and standards to protect. Ensures the privacy. Province. Ensures government's.
Ensures ministries. Clarifies the interpretation. IM/IT policies, procedures and standards.
Compliance Monitoring. Develops mechanisms.
IM/IT policies, procedures. Proposes corporate. IM/IT performance metrics that enable ministry compliance. Informs ministry.
CIOs of their responsibilities in complying with corporate IM/IT policies. Recommends and. reviews audits in coordination with other central authorities to ensure. IM/IT policies, procedures and standards. Accesses audit. report data to identify information management practices, and information. Identifies information. Government CIO's duties from any.
Advising Government. Advises senior. ministry decision makers, committees and councils, Treasury Board and. Cabinet regarding telecommunications, access rights in the public and. Provides analysis. Treasury Board Staff on initiatives, submissions. Strategic IM/IT Planning. IM/IT Planning. Framework.
Leads the strategic. IM/IT governance. Develops, maintains. IM/IT planning framework.
Facilitates the. corporate strategic IM/IT planning process and ensures the alignment. IM/IT plans with government's strategic direction. Develops and maintains. Broader Public Sector (BPS) CIOs to communicate. IM/IT strategic direction and promote the alignment of. BPS IM/IT with core government.
Ensures that the. Province is aware of and keeping pace with legislation, policy trends. Defines corporate. IM/IT priorities. Information Resource.
Planning. Provides leadership. Information Resource Management Planning (IRMP) process. Coordinates ministry. IRMPs with government's IM/IT strategic directions and priorities. IM/IT Human Resource. Capital Planning. Recommends the. strategic direction for human resource capital needed to focus on IM/IT.
Identifies human. IM/IT. strategic plan.
Advises Public. Service Agency on IM/IT human resource capacity required to achieve. IM/IT strategic directions and priorities.
Ensures that awareness. IM/IT assets. Strategic Infrastructure. Development. Defines the technological. IM/IT across government. Provides the strategic.
IM/IT projects. Evaluates new information. Ensures that structures. IM/IT sub- committees support strategic. Reviews the IM/IT implications of agreements. IM/IT infrastructure and strategic.
Designs strategic. Closes the Digital.
Divide for First Nations communities, and establishes the basis for. Provides leadership. IM/IT projects to facilitate the ongoing. Transformational Opportunity. Analysis. Chairs the CIO. Council. Advises ministries.
CIO. Researches and. IM/IT practices in. Identifies and. assesses transformational or integrating IM/IT opportunities in government. Broader Public Sector. Promotes the development. Ensures alignment. IM/IT projects and.
Proposes efficiency. Security. Provides the overall. Ensures that measures. IM/IT security policies, procedures. Ministry Chief. Information Officer.
Governance and Policy. Governance Authority.
Reports to their. ADM accountable for IM/IT, with a functional reporting. Government CIO and the ministry CIO. Maintains accountability. IM/IT initiatives that have no cross- government. Maintains accountability.
IM, budgets, records management, forms management, privacy, security. IM/IT strategic planning and IT (including ministry infrastructure). Manages information. Ensures that the. Develops an IM/IT. Strategic HR Director.
Legislation. Provides legislated. Personal Information Directory summaries for the Personal Information.
Directory. c) Policies and Standards. Reinforces IM/IT. Compliance Monitoring. Ensures compliance. IM/IT core policies and standards. Advice to Government. Ensures that information.
Strategic IM/IT Planning. IM/IT Planning. Framework. Establishes strategic. IM/IT direction. Participates in. IM/IT planning. Accesses the Executive. Information Resource. Planning. Plans the three.
Information Resource Management Plan. Works together. with other ministry CIOs on horizontal initiatives, both within and. IM/IT Human Capital. Planning. Develops staff.
Manages ministry. Transformational Opportunity.
Analysis. Provides business. Strategic Infrastructure. Development. Functions with. Information Management within their ministry. Supports ministry.
Supports ministry- unique. Develops ministry. Security. Protects information. Uses security categories. Risk. Management Branch. Identifies and. categorizes information and other assets based on the degree of injury. Policy. 12. 3. 1.
Appropriate Use of Government Resources. Objectives. Meet the requirements. Standards of Conduct.
Maximize productivity. Protect the privacy. Increase adherence.
Promote public. trust in government's use of information and technology assets. General. All users of government's information and information technology resources must take responsibility for, and accept the duty to, actively protect them. Government information helps to enable citizen- centric service delivery and information technology supports employees to work efficiently in delivering those services. Proper use of these technologies assists in the daily management of information, saves time and money, reduces administrative overhead and improves service delivery.
Improper use may jeopardize the confidentiality, integrity and availability of government information and information technology assets, and may put personal information protection, security or service levels at risk. See the OCIO website for Appropriate Use of Government Information and Information Technology Resources (“Appropriate Use Policy”) at http: //www. Information and Technology Planning. Objectives. Establish planning.
Help ministries. align information and technology investments with program objectives. Improve accountability.
Evolve an enterprise. Provide strategies. Facilitate the. re- establishment of operations during, and immediately following, a.
General The Office of the. CIO oversees the information and technology planning cycle to locate.
The Government CIO has overall responsibility. Information Resource Management Planning (IRMP) process. This. annual planning cycle is driven by the broader business planning cycle. CPPM chapter 3, Part 1, Objectives). The development of an IRMP helps ministries align information and technology. British Columbia.
The IRMP. provides an opportunity to assess and strategize for optimization of shared. Vital records and.
Plans. must include how to re- establish the systems and records that enable government. Service disruptions can range from. Policya). Information Resource Management Plans. An update of a. three to five year Information Resource Management Plan must be submitted. Government Chief Information Officer and Treasury Board.
Staff. b). Vital Records and Information Technology Business Continuity Plans. Government must. create and maintain a business continuity plan that includes identification. Vital records. must be maintained so that re- establishing the legal, financial and. Vital records. must be maintained in a manner that meets current environmental and.
Ministries must. develop, or work with their supporting infrastructure technology service. Business Continuity and Disaster Recovery Plans. See CPPM chapter 1. Business. Continuity Management, chapter 1. Risk. Management and the Government CIO website Information. Resource Management Planning. Information Management.
Part. I: Data Management and Architecture. Objectives. Derive maximum. Facilitate and. enhance government's ability to make informed decisions. Improve the accuracy. Increase system. effectiveness and efficient access to data. Share data within.
British. Columbia. General To demonstrate that. Consistent. data management practices allow a common structure for data access, integrated. The use of data within government is governed by legislation. More specific legislation also authorizes. Policy a) Data Management.
The Government. CIO must define, maintain and publish government data definitions and. Data and corresponding. Ministries must. establish and maintain a data administration/architecture program to.