(a) State agencies shall protect information against unauthorized access, disclosure, modification or destruction, whether accidental or deliberate, as well as assure the availability, integrity, utility, authenticity, and confidentiality of information for the entire lifecycle of that information. Data shall be encrypted where appropriate using industry accepted encryption practices. Access to State information resources must be appropriately managed.
(b) All State agencies are required to have information resources security practices consistent with these rules, including adequate controls and separation of duties for tasks that are susceptible to fraudulent or other unauthorized activity. The agency head is responsible for the protection of information resources.
(c) All State agency employees are accountable for their actions relating to information resources. Information resources shall be used only for intended purposes as defined by the agency and consistent with applicable laws.
(d) Risks to information resources must be managed. The expense of security safeguards must be commensurate with the value of the assets being protected.
(e) The integrity of data, its source, its destination, and the processes applied to it must be assured. Changes to data must be made only in an authorized and documented manner.
(f) Information resources must be available when needed. Continuity of information resources supporting critical governmental services must be ensured in the event of a disaster or business disruption.
(g) Security requirements shall be identified, documented, and addressed in all phases of development or acquisition of information resources.
077-3 Wyo. Code R. § 3-2
Amended, Eff. 6/8/2016.