Data Administration Policy
- Responsible Oversight Executive:ÌýVice President for Administration and Finance
- Date of Current Revision or Creation: February 14, 2022
- Download Policy PDF
The purpose of this policy is to establish the framework for administering the University's institutional data.
Ìý
, grants authority to the Board of Visitors to make rules and policies concerning the institution. Section 7.01(a)(6) of theÌýÌýgrants authority to the President to implement the policies and procedures of the Board relating to University operations.
Restructured Higher Education Financial and Administrative Operations Act,Ìý
Application AdministratorsÌý- Individuals with administrative application or system privileges, who are responsible to ensure that appropriate controls, mechanisms, and processes are in place to meet the security requirements necessary to protect an information technology resource.
Data ClassificationÌý- In the context of information security, it is the classification of data based on its level of sensitivity and the impact to the University should that data be disclosed, altered, or destroyed without authorization.
Data ElementÌý- In electronic recordkeeping, a combination of characters or bytes referring to one separate item of information such as name, address, or age.
Data Compliance OwnersÌý-ÌýData Compliance Owners understand the compliance requirements for the data under their purview, designate the compliance level of their data, and approve the access to and use of the data.
- University Data Compliance Owners oversee compliance for data that is shared or leveraged across the University, such as HR, Finance, Financial Aid, and Student FERPA data.
- Departmental Data Compliance Owners oversee the data that is specific to the departmental application or system that is not overseen by one or more of the University Data compliance Owners.
Data UsersÌý- Those authorized to access institutional data and information in order to perform their assigned duties or to fulfill their role in the University community.
Information Security Officer (ISO)Ìý- The Old à£à£Ö±²¥Ðã University employee, appointed by the President or designee, who is responsible for developing and managing Old à£à£Ö±²¥Ðã University's information security program.
Institutional DataÌý-ÌýRecorded information that documents a transaction or activity by or with any appointed board member, officer, or employee of the University. Regardless of physical form or characteristic, the recorded information is an institutional record if it is produced, collected, received, or retained in pursuance of law or in connection with the transaction of University business. The medium upon which such information is recorded has no bearing on the determination of whether the recording is an institutional record. Institutional records include but are not limited to personnel records, student records, academic records, financial records, patient records and administrative records. Record formats/media include but are not limited to email, electronic databases, electronic files, paper, audio, video, and images.
Personally Identifiable InformationÌý-ÌýPersonally identifiable information (PII) is defined as data or other information that is tied to or which otherwise identifies an individual or provides information about an individual in a way that is reasonably likely to enable identification of a specific person and make personal information about them known. For the purposes of classification at ODU, certain PII can be considered public, such as that designated as directory information under FERPA, or confidential or restrictive based on ability to use the information for harmful purposes such as identity theft.
Research and Scholarly Data ("Research Data")Ìý-ÌýDigitally recorded information (necessary to support or validate a research project's observations, findings, or outputs. Specifically, data that are:
- Acquired and/or maintained by University employees and/or students in performance of research and/or in pursuit of a scholarly activity;
- Created or updated in pursuit of a research or scholarly function;
- Necessary to support research or scholarly findings, establish validity of inventions, and prove ownership of Intellectual Property Rights.
System Compliance OwnersÌý- The manager or departmental head responsible for operation and maintenance of a University IT system or overseeing hosted systems under their purview. System Compliance Owners are responsible for the overall compliance and security of their system.
This policy applies to all users of Old à£à£Ö±²¥Ðã University information technology resources and governs all information technology resources either owned by or operated for University business through contractual arrangements. Users may include employees, students, volunteers, and visitors to the institution. Employees include all staff, administrators, faculty, full- or part-time, and classified or non-classified persons who are paid by the University. Students include all persons admitted to the University who have not completed a program of study for which they were enrolled; student status continues whether or not the University's programs are in session. Visitors include vendors and their employees, parents of students, volunteers, guests, uninvited guests, and all other persons located on property owned, leased, or otherwise controlled by the University or using information technology that is provided by the University.
This policy refers to all data owned, used, created, or maintained by the University whether individually controlled or shared, stand-alone or networked. It applies to all data sources found on equipment owned, leased, operated, or contracted.
Data Administration and Classification
It is the policy of Old à£à£Ö±²¥Ðã University that the framework for the administration of institutional data is built upon the accepted standards of practice, the understanding of institutional data, and the roles and responsibilities involved in the management of the data.
The security of institutional data and the infrastructure upon which it is processed, transmitted, or stored is patterned after accepted standards for management of information security, such as ISO/IEC 27001/2, Information Technology - Security Techniques - Code of Practice for information security controls, industry best practices and practices of comparable higher education institutions.
Data classifications and associated protective controls account for academic and business needs for sharing or restricting information and the impact associated with such needs. Data classification informs security decisions such as location of stored data, authorization and access requirements, continuity of operations and disaster recovery planning, and are maintained in risk assessment documents. Data classification levels along with certain transmission and storage expectations are found inÌý.
Research and Scholarly Data
Research and scholarly data are generally not considered institutional data and are governed by the Research and Scholarly Data Governance Committee (RSDGC). The RSDGC is a University-level committee charged with oversight of the policy and guidelines for the management of and access to the University's Research Data in accordance with University policies and applicable law.
Roles and Responsibilities
The specific responsibilities of Data Compliance Owners, Data Users, Application Administrators, oversight committees, and other security roles are identified withinÌý.
Violations of this policy should be reported to the University's Information Security Officer. Any faculty, staff or student found to have violated this policy may be subject to the appropriate disciplinary action.
-
Data elements are reviewed and identified by the data compliance owner. Using the data classification levels outlined inÌýÌýdata compliance owners make classification determinations.
-
System compliance owners in collaboration with the data compliance owner will conduct a System Risk Assessment in accordance withÌýfor all new and hosted systems that maintain sensitive data. The completed System Risk Assessment will be forwarded to the Information Security Officer.
Applicable records must be retained and then destroyed in accordance with theÌý.
Ìý
Information Security Officer
Ìý
- Board of Visitors Policy 1424, Policy on Intellectual Property
- University Policy 3500 - Use of Computing Resources
- University Policy 3501 - Information Technology Access Control Policy
- University Policy 3505 - Information Technology Security Policy
- University Policy 4100 - Student Record Policy
- University Policy 5350 - Research and Scholarly Digital Data Management Policy
- Office of Research Volunteer or Visiting Scholar Agreement
Policy History
Policy Formulation Committee (PFC) & Responsible Officer Approval to Proceed:
/s/ÌýJ. Douglas Streit
Responsible Officer
January 4, 2022
Date
Policy Review Committee (PRC) Approval to Proceed:
/s/ÌýDonna W. Meeks
Chair, Policy Review Committee (PRC)
December 14, 2021
Date
Executive Policy Review Committee (EPRC) Approval to Proceed:
/s/ÌýTodd K. Johnson
Responsible Oversight Executive
February 8, 2022
Date
University Counsel Approval to Proceed:
/s/ÌýAllen T. Wilson
University Counsel
February 10, 2022
Date
Presidential Approval:
/s/ÌýBrian O. Hemphill, Ph.D.
President
February 14, 2022
Date
Previous Revisions: October 1, 2007; April 16, 2011; December 14, 2015; February 14, 2022
Scheduled Review Date: February 14, 2027