OUHSC Information Technology Department |
Workstation Use and Security Policy: Supporting documents: Full policy Procedures must be in place to ensure all University workstations are classified based on allowable capabilities and activities and secured accordingly in order to protect the confidentiality, integrity, and availability of sensitive data contained on or accessed through the workstations. This includes defining the functions to be performed, the manner in which they are to be performed, and the physical attributes of the surroundings of a specific workstation or group/class of workstations which contain or provide access to sensitive data. The level of protection provided for University workstations containing or providing access to sensitive data must be commensurate with the identified risks. An assessment of the risks to University workstations which contain or provide access to sensitive data, including a vulnerability scan and corrective actions per the Vulnerability Assessment Standard. The risk assessment documentation must be securely maintained. At a minimum the following controls must be in place for University workstation containing or providing access to sensitive data:
|
|
Copyright © 2006 The Board of Regents of the University of Oklahoma, All Rights Reserved.- Disclaimer | Copyright |