Section | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Roles and ResponsibilitiesData ClassificationRisk ManagementInformation Security and Privacy PoliciesInformation Security and Privacy Policies Information Security ControlsGuiding PrinciplesThe University of California is committed to high standards of excellence for protection of information assets and information technology resources that support the University enterprise. The University processes, stores, and transmits an immense quantity of electronic information to conduct its academic and business functions. Without the implementation of appropriate controls and security measures, these assets are subject to potential damage or compromise to confidentiality or privacy, and the activities of the University are subject to interruption. Management PrinciplesStewardship and Accountability Architecture PrinciplesDefense In Depth Information Security and Privacy PoliciesInformation Security decision making is guided by documented policies. Roles and ResponsibilitiesInformation Security roles must be formally defined and individuals must be assigned to fulfill those roles. Data ClassificationData must be formally inventoried and assigned a risk classification. Risk ManagementThe critical component to implenting information security is performing risk assessment on all information and infrastructure assets. Information Security ControlsEach risk classification has a baseline of controls for risk mitigation. These controls must be modified based on individual system risks.
|
Page Comparison
General
Content
Integrations