All computing devices used on university's behalf must conform to standardized requirements to ensure the security, reliability, and stability of university resources.
To define devices and workstations, and to list their respective requirements and procedures in order for those workstations and devices to be granted access to university resources.
Compliance with this policy is mandatory for all university agents, employees, students, and affiliates using any device or workstation on the university's behalf.
All devices must meet the following requirements:
Devices used to access, store, transmit, or receive data for which the university has an obligation to maintain confidentiality must use operating system and application software that is eligible and configured to receive ongoing security updates from its vendor. Devices with unsupported or end-of-life "EOL" software may be denied access to the university network. Users with devices not owned or issued by the university may seek assistance from information technology for configuration if the intended use of the device is for university business.
The university may require a device to be registered with the university's management tools prior to it being granted the ability to access, store, transmit, or receive data for which the university has an obligation to maintain confidentiality. Access, storage, transmission or receipt of data for which the university has an obligation to maintain confidentiality confers consent to the university to manage the registered device, including enforcement of security settings such as inactivity timeouts, personal identification number "PIN" or password strength requirements, remote device tracking features, remote lock and device wipe features, and other security features available on the device.
Except for designated guest networks, all devices must have the device's media access control "MAC" address registered with the information technology department in order to access the university network. Any device without a registered MAC address may be removed from the network without notice.
To limit risk to university data from malicious software, all devices based on the microsoft windows operating system platform used to access, store, or transmit, or receive data for which the university has an obligation to maintain confidentiality must have an installed and operating anti-virus software with definitions not more than seven days old. Anti-virus protection is recommended on other operating system platforms, such as apple mac-os, linux, or tablet/smartphone mobile device operating systems. Information technology provides guidance and limited support on anti-malware software for non-university of Toledo "UT" issued devices if the intended use of the device is for university business.
Strong encryption is required to render unusable, unreadable, or indecipherable the following categories of data while stored on devices or nonvolatile media:
Encryption is highly recommended but not required for devices not purchased, owned, or issued by the university so long as the device does not store the categories of data listed in this paragraph. The information technology department provides guidance and limited support on encryption software for non-UT issued devices if the intended use of the device is for university business.
Exceptions for devices where no feasible encryption technology exists may be made on a case by case basis and may be subject to compensating controls established by the university CIO/CTO or designee.
All devices must be reasonably secured against loss, theft, and inappropriate access. Devices which access, store, transmit, or receive data for which the university has an obligation to maintain confidentiality must be physically situated in a manner that prevents viewing of confidential data by individuals who are not authorized to view the data. Unlocked devices may not be left unattended while authenticated to the university network.
Devices used to access, store, or transmit, or receive data for which the university has an obligation to maintain confidentiality must have a reasonable and appropriate operating system inactivity lockout feature enabled.
All devices which access, store, transmit, or receive data for which the university has an obligation to maintain confidentiality must be configured with a basic host firewall or reasonable substitute.
All devices which access, store, transmit, or receive ePHI or cardholder data or other sensitive data, must have available vendor default application and security logging enabled, and such devices must be made available to university administration for investigation, inspection, and audit upon request.
When disposing of a device, the owner must make a reasonable effort to erase or remove all university of Toledo information from the device.
The university of Toledo is not responsible for damage, loss, or theft of devices not owned by the university. Lost or stolen devices with access to university information systems or containing data for which the university has an obligation to maintain confidentiality must be reported to university of Toledo information technology help desk as soon as practicable, by telephone at (419) 530-2400 or (419) 383-2400, or by e-mail at ithelpdesk@utoledo.edu.
In addition to the requirements for general devices set forth in this paragraph, university workstations must also meet the following requirements:
The following activities are prohibited:
In the event of a security incident or alleged breach, the university has the authority to investigate and identify any data involved involving workstations, and to the extent possible, fulfill the university's obligations to mitigate the effects of the incident. Use of the university network constitutes consent to provide access to a device in this regard, including making the equipment available to audit and investigation by university personnel.
Violations of this policy will be subject to the university's disciplinary process and may result in disciplinary action up to and including termination. Minor violations will result in removal of the offending device from the university network at the discretion of information technology or administration. Criminal activity subject to applicable state and federal criminal penalties may be referred to law enforcement as appropriate.
Ohio Admin. Code 3364-65-06
Promulgated Under: 111.15
Statutory Authority: 3364
Rule Amplifies: 3364
Prior Effective Dates: 05/28/2018