This policy defines the mechanisms adopted to secure information technology systems and the infrastructure against security threats. |
Overview |
This policy applies to the following types of security at the university: Computer Systems and Application Security Physical Security Operational Security Procedural Security Network Security |
Scope |
Establishing and developing an integrated technical infrastructure to meet the requirements of the local and international commissions. |
Strategic Objective |
Providing protection against the potential consequences resulting from breaches of confidentiality or lack of service availability. Ensuring the protection of the information assets, and network and computer facilities against damage, loss, and misuse. Ensuring that the members of the university community understand and adhere to the principles of electronic information usage. Increasing the awareness and understanding of the university's information security requirements. Increasing user awareness of their direct responsibility for protecting the confidentiality and integrity of the data they own or deal with. |
Detailed Objective |
Policy:
1. Confidentiality and Privacy:
All members of the UQU Community are obligated to respect and protect confidentiality of data. UQU does not monitor the content of personal web pages, e-mail, or other online communications. However, UQU reserves the right to examine computer records and monitor the activities of individual computers upon approval by the UQU Administration.
2. Access:
No one in UQU is allowed to access confidential records unless specifically authorized to do so. Authorized individuals may use confidential records only for legitimate purposes. Technology assets must be kept in an appropriately secure physical location. The management team must ensure that controls are in place to avoid unauthorized intrusions into systems and networks and to detect attempts of such intrusions.
3. Accountability:
Members of the UQU community are responsible for ensuring that others do not use their system privileges. UQU authorized staff are responsible for reviewing the audit logs and identifying potential security violations. All controlled systems should maintain audit logs to track usage information up to a level appropriate for each system. If a UQU authorized staff member suspects that a security breach has occurred, they must immediately notify the immediate supervisor.
4. Authentication:
Authentication for point-to-point communication is implemented for all systems that send or receive data.
5. Availability:
Mission critical systems are expected to be 99.9% available. Both mission critical systems and critical systems must be redundant and should have detailed recovery procedures and specific notification for downtime periods. Data backup procedures should be tested and well documented.
6. Reporting Violations
Owners of computer, network, and applications systems, and users of these systems, have the responsibility to report any apparent security violations. Guidelines for reporting violations must be available to all users and management teams. These guidelines should provide guidance on what, when, where, to whom, and within what time frame the violation should be reported. The concerned user(s) must be notified in case of a breach.