ISU Standard for Computer System Workstation Security

Introduction

ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security. This standard is applicable via the Section 800 Information Technology Policies contained in the university policy handbook available at:  Information Technology Policies | Indiana State University (indstate.edu)  

Workstation Security Standard

  • 810 Acceptable Use of Information Technology
    • ISU Employees must:
      • At no time provide their password to anyone, including family members.
      • Lock the workstation before leaving it unattended, even if the expected time away is brief.
      • Have a secure designated worksite that must be established either on-campus and/or at an alternative/remote environment for day to day work activities.  (Alternative/remote worksites must be physically secure with an expectation of privacy at the same level as an on-campus worksite.)
      • Use ISU-managed system to fulfill all work responsibilities on-campus or at alternative/remote environments.
        • The ISU-managed system must be properly configured with an approved and supported standard operating system, software, and web/telecommunication capabilities. No unapproved modifications of the deployed ISU-managed system baseline will be made.
      • Have a reliable internet service provider with necessary bandwidth at their working location. Employees are responsible for providing their own internet and phone services at alternative/remote environments. Wireless networks must be secured with strong passwords and modern security protocols (such as WPA2).
      • Use ISU managed VPN access for access to sensitive systems and departmental file shares from alternative/remote worksites and access from any public network during authorized travel.
      • Not install/use personal VPNs on ISU managed workstations.
      • Are responsible for any university-owned equipment and software used at alternative/remote worksites and are personally responsible for any such equipment that is lost, stolen, or damaged due to the employee's negligence, misuse, or abuse.
        • ISU will solely repair and maintain any provided equipment unless otherwise authorized. The employee will be responsible for:
          1. any intentional damage to the equipment;
          2. damage resulting from negligence by the employee or anyone present at an alternative/remote worksite;
          3. damage resulting from a power surge if no surge protector is used; and
          4. maintaining the system/device to ISU’s configuration and security baseline.
  • 830 Data Security and Management
    • Abide by data security standards for protecting and controlling sensitive or restricted information in both hardcopy and electronic format.
    • Host virtual meetings with MS Teams, Zoom, or other appropriate ISU-supported, secure virtual conferencing platforms.
    • Create, modify, or store data while either working on-campus or remotely using an ISU-managed system and ISU supported storage such as OneDrive for Business or the network file share.

Conclusion

It is expected that all ISU employees adhere to this security standard.

Details

Article ID: 144926
Created
Tue 7/12/22 12:38 PM
Modified
Fri 11/3/23 8:20 AM