Ohio Admin. Code 3358:5-11-19 - Information technology security policy
(A) Information
technology (IT) assets are comprised of computing equipment, network
infrastructure, operating systems, applications, data, and all technologies
that support the information and computing needs of the college.
(B) The college is responsible for the
security and integrity of data it acquires about employees, independent
contract workers, students, board members, student and employment applicants,
and users of its facilities.
(C) IT
assets must be protected from various security threats such as theft,
vandalism, virus infections, denial of service attacks, and other activities
that would breach their confidentiality, compromise their integrity, or prevent
their availability.
(D)
Appropriate controls must be used to protect physical
access to resources, commensurate with the identified level of acceptable risk.
These may range in scope with complexity from extensive security installations
to protect a room or facility where server are located to simple measures taken
to protect a user's display screen.
(L)
User accounts and access to network assets can be
revoked at any time.
Notes
Promulgated Under: 111.15
Statutory Authority: 3358
Rule Amplifies: 3358
Prior Effective Dates: 5/30/07, 3/18/15
State regulations are updated quarterly; we currently have two versions available. Below is a comparison between our most recent version and the prior quarterly release. More comparison features will be added as we have more versions to compare.
No prior version found.