(1) Definition of administrative data
(a) The university's database consists of
information critical to the success of the university as a whole. Data may be
stored on paper or as digital text, graphics, images, sound, or video. This
rule applies to data generated for or by the administrative functions of the
university, including (but not limited to) finance, student and enrollment
services, and human resources, and to data stores and systems which access such
data, regardless of where it resides, including (but not limited to) servers,
desktops, flash drives, cloud services and mobile devices.
(b) Some examples of administrative data
include student course grades, employee salary information, vendor payments,
and the university's annual fact book. Administrative data do not include
personal electronic calendar information, faculty grade books, research data
and similar material.
(c) Copies of
official data are not official data where they are found on portable storage
media, individual hard drives, department servers, or as files on other shared
systems. These copies or downloads cannot be used as substitutes for official
records kept by the authorized data custodians of the university. However, such
information may be used to generate official reports on behalf of the
university with the knowledge and permission of the data custodians. Such files
and any resulting reports are covered by the same constraints of
confidentiality and privacy as the official records.
(d) Prior to the development of a system that
will download official records and manipulate them for subsequent update or
application to official records, permission shall be obtained from the data
custodian for such transfer.
(e)
Data custodians shall also authorize any university administrative data
captured independent of a university system.
(2) Data classifications and protection
(a) Sensitive information
"Sensitive information" is that data found upon review by the
data trustees or general counsel to require restrictions on access. Sensitive
information may not be subject to disclosure under the Public Records Act and
is only available to CSU employees that have a business or educational need to
access the data. Sensitive information is broadly defined as that which the
university is legally obligated to protect. For example:
(i) Educational records, as defined by the
Family Educational Rights and Privacy Act (FERPA.)
(ii) Health records, as defined by the Health
Insurance Portability and Accountability Act (HIPAA.)
(iii) Financial and personnel information, as
governed by the Fair Credit Reporting Act (FCRA.)
(iv) Financial information governed by
payment card industry standards (PCI-DSS.)
(v) Examples (not all-encompassing):
(a) Class rosters, transcripts, schedules,
attendance
(b) Lists of names,
addresses, identity numbers, dates of birth
(c) Records of medical care, including
psychological counseling
(d)
Identification photographs, including archived copies of government issued
identification
(e) Account numbers
or images of any financial instrument, including credit cards
(f) Pre-employment or routine background
check information
(b) Private information
"Private information" is data that the data trustees judge to
require special procedures for access. Private information may be subject to
disclosure under the Public Records Act and is made available to certain
Cleveland state employees based on their job function. Private information is
broadly defined as that which should be reasonably protected from inadvertent
disclosure beyond authorized Cleveland state university employees. For
example:
(i) Data not specifically
protected by statute, regulation, or other legal obligation or
mandate.
(ii) Shall be protected
due to contractual, ethical, or privacy considerations.
(iii) Access, disclosure, or modification
could cause financial loss or damage to CSU's property.
(iv) Examples (not all-encompassing)
(a) Directory information of students who
have not requested FERPA privacy inclusion
(b) Instructional information such as tests,
quizzes, and course shells in a learning management system (LMS)
(c) Proprietary information used to run the
business of the university
(c) Public information
"Public information" is all data that is neither restricted,
nor judged by data trustees to be sensitive or private. The accessible data
volume should be as great as possible to enable those who need the information
to have access. Data should be part of an open atmosphere and readily
available. Public information is subject to disclosure to all Cleveland state
employees as well as the general public under the Ohio Public Records Act.
Public information is broadly defined as that which is intentionally displayed
for anyone to use, including:
(i)
Disclosure is routine, deliberate or required by contract or university
policy.
(ii) Can be subject to use
restrictions (copyright) but no harm done in disclosure.
(d) Protection of data
(i) Users shall comply with all reasonable
protection and control procedures for administrative data to which they have
been granted access. Sensitive and private data can never be stored on
departmental computers or servers, cd's, thumb drives or any easily
transportable medium. All sensitive data shall be stored on secured storage
located within the university's data center.
(ii) It is never acceptable to store
sensitive data such as grades, social security numbers, correspondence between
student and faculty, classified research, etc., on externally hosted systems,
including cloud-based storage systems (includes, but is not limited to,
services such as dropbox, google drive, and microsoft onedrive), without a
contract that is fully vetted for compliance with university policies. Vendors
providing hosted services shall complete the hosting services security
checklist.
(iii) Any contract that
will provide a third party (e.g. contractors, consultants, service providers,
vendors) with sensitive information, or access to Cleveland state university
systems or applications that contain sensitive information shall, at a minimum,
include the following provisions:
(a) Explicit
acknowledgment that the contract allows the contractor access to confidential
information
(b) A specific
definition of the confidential information being provided
(c) A stipulation that the confidential
information shall be held in strict confidence and accessed only for the
explicit business purpose outlined in the contract
(d) A guarantee from the contractor that it
shall ensure compliance with the protective conditions outlined in the
contract
(e) A guarantee from the
contractor that it shall protect the confidential information it gets according
to commercially acceptable standards and no less rigorously than it protects
its own customers' confidential information
(f) A provision allowing for the return or
destruction of all confidential information obtained by the contractor on
completion of the contract
(g) A
stipulation allowing injunctive relief, without posting bond, to prevent or
remedy breach of the contract's or contractor's confidentiality
obligations
(h) A stipulation that
a violation of the contract's protective conditions amounts to a material
breach of contract and entitles the university to immediately end the contract
without penalty
(i) A provision
allowing auditing of the contractor's compliance with the contract's safeguard
requirements
(j) A provision
ensuring that the contract's protective requirements shall ending the
agreement
(3) Data trustees, data custodians and data
users
(a) "Data trustees" are senior
management personnel (typically at the level of vice president, associate or
vice provost, dean, or university director) who have planning and policy-making
responsibilities for data in their operational area. The data trustees, as a
group, are responsible for overseeing the establishment of data management
policies and procedures.
(b) "Data
custodians" are managers of functional areas (typically at the level of
controller, registrar or director of admissions) who oversee the capture,
maintenance, and dissemination of data for a particular operation. Data
custodians are responsible for making security decisions regarding access to
the data under their charge.
(c)
"Data users" are individuals who access university data in order to perform
their assigned duties or to fulfill their role in the university community.
Data users are responsible for protecting their access privileges and for
proper use of the university data they access.
(4) Responsibilities of data trustees, data
custodians, and information services and technology
(a) Criteria for determining access
(i) Data custodians are ultimately
responsible for assigning access to all types of data on an individual basis;
however, general criteria for determining access to both sensitive and private
information include the following:
(ii) Human resources/payroll data can be made
available as follows:
(a) Personnel in the
employee's supervisory chain of authority
(b) Human resources, payroll, and business
contacts in departments shall have access to human resources/payroll data for
employees in their departments.
(c)
Authorized employees of the department of human resources, payroll department,
budget office, controller's office, grant accounting, department of audits, the
office of general counsel, the office for institutional equity, and the
department of law enforcement and safety, shall have access to human
resources/payroll data on a case-by-case basis as appropriate for them to
perform their job responsibilities. Human resources/payroll data shall be
provided on a case by case basis in response to judicial orders or lawfully
issued subpoenas.
(d) Legally
authorized law enforcement personnel, authorized federal or state agencies,
members of duly appointed grievance committees, representatives of authorized
accrediting organizations, and agencies processing claims made by the employee
for workers' compensation, unemployment insurance or other employee benefits
which shall have case-by-case access to the portions of the official personnel
files which are appropriate for their business.
(e) To appropriate parties in a health or
safety emergency.
(iii)
Financial data can be made available as follows:
(a) President, vice presidents, provost,
deans, department heads and other personnel with responsibility for the
management and oversight of financial resources
(b) Business managers and business office
staff in departments.
(c)
Authorized employees of business and finance, office of general counsel,
division of law enforcement and safety and the department of audits who have a
business need to access the data
(iv) Student data can be made available in
accordance with FERPA.
(b) Development of access policies and
procedures
Each data custodian shall be individually responsible for
establishing data access procedures that are unique to a specific information
resource or set of data elements.
(c) Promotion of accurate interpretation and
responsible use
(i) Data trustees shall
develop policy to promote the accurate interpretation and responsible use of
administrative data.
(ii) Data
custodians are responsible for making known the rules and conditions that could
affect the accurate presentation of data. Persons who access data are
responsible for the accurate presentation of that data.
(iii) Data custodians shall support users in
the use and interpretation of administrative data, primarily through
documentation, but also in the form of consulting services.
(d) Determination of security
requirements
The data custodians, in consultation with information services
and technology, shall determine security requirements for administrative data
and shall be responsible for monitoring and reviewing security implementation
and authorized access.
(e)
Establishment of disaster recovery procedures
(i) Information services and technology is
ultimately responsible for defining and implementing policies and procedures to
assure that data are backed up and recoverable. The data trustees shall play an
active role in assisting information systems and technology (IS&T) in this
responsibility.
(ii) With the data
trustees' advice, IS&T shall develop a workable plan for resuming
operations in the event of a disaster, including recovery of data and
restoration of needed computer hardware and software.
(f) Responsibilities of information services
and technology
(i) IS&T develops and
applies standards for the management of institutional data and for ensuring
that data are accessible to those who need it.
(ii) IS&T works with the data trustees to
establish long-term direction for effectively using information resources to
support university goals and objectives.
(iii) IS&T makes institutional data
available to authorized users in a manner consistent with established data
access rules and decisions.
It develops views of data as directed by the data custodians.
IS&T and the data custodians ensure that the technical integrity of the
data is maintained and that data security requirements are met.
(iv) IS&T and the data
custodians ensure that the university community is aware of this policy and the
requirements and restrictions it contains.
(5) Requests for access
(a) Sensitive or private data access
Access to sensitive or private data by university employees or
employees of university-related foundations requires that a formal request be
made to the appropriate data custodian.
(b) Exceptions
All requests for exceptions to data access policies shall be
made in writing to the data custodian. Email requests are acceptable. The
request shall specify the data desired and their intended use.
(c) Denial
The data custodian shall provide a written record of the
reason(s) for denial of any access request. Email records are
acceptable.
(6)
Responsibilities of users
(a) Use of
administrative data only in the conduct of university business
The university expressly forbids the disclosure of unpublished
administrative data or the distribution of such data in any medium, except as
required by an employee's job responsibilities and approved in advance by the
employees supervisor and the respective data custodian. In this context,
disclosure means giving the data to persons not previously authorized to have
access to it. The university also forbids the access or use of any
administrative data for one's own personal gain or profit, for the personal
gain or profit of others, or to satisfy personal curiosity. Users agree to use
the information only as described in the request for data access. Failure to do
so could result in disciplinary or legal sanctions as set forth in university
policy.
(b) Maintenance of
confidentiality and privacy
Users shall respect the confidentiality and privacy of
individuals whose records they access, observe any ethical restrictions that
apply to data to which they have access, and abide by applicable laws and
policies with respect to access, use, or disclosure of information. All data
users having access to sensitive or private information shall formally
acknowledge (by signed statement) their understanding of the level of access
provided and their responsibility to maintain the confidentiality of data they
access. Each data user shall be responsible for the consequences of any misuse.
Users are expressly prohibited from releasing identifiable information to any
third party.
(c) Accurate
presentation of data
(i) Users shall be
responsible for the accurate presentation of administrative data when
presenting data on behalf of the university. Users shall be responsible for the
consequences of any intentional misrepresentation of that data.
(ii) The office of institutional research
(IR) serves as the comprehensive source for data about Cleveland state
university. The primary goal of IR is to collect, comprehend, combine, and
analyze institutional data pertaining to a range of operational activities. IR
assists in the analysis and interpretation of these data to explain past
patterns and predict future trends in university performance.
(iii) The office of institutional research
shall be the university's clearinghouse for official reports to external
agencies including federal and state governments.
(d) Management oversight
(i) All levels of management are responsible
for ensuring that all data users within their area of accountability are aware
of their responsibilities as defined in this policy. Specifically, managers are
responsible for validating the access requirements of their staff according to
their job functions, and for insuring a secure office environment. The head of
each unit will authenticate the need for individual access to data and shall
request and obtain authorization for access to data from the custodian of such
data.
(ii) Administrative and
academic unit heads are responsible for taking the necessary steps to ensure
that data access is terminated for employees who transfer to another department
within the university or leave employment of the university.