11.07.2015 Views

Immaculata University IT Security Incident Response Plan

Immaculata University IT Security Incident Response Plan

Immaculata University IT Security Incident Response Plan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IMMACULATA UNIVERS<strong>IT</strong>Y <strong>IT</strong> SECUR<strong>IT</strong>Y INCIDENT RESPONSE PLANEffective Date:AuthorityThis Program was approved by the President of <strong>Immaculata</strong> <strong>University</strong>(hereinafter “IU”).Program Statement This IU <strong>IT</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong> <strong>Plan</strong> (the “<strong>Plan</strong>”) definesstandard methods for identifying, documenting and responding to Data<strong>Security</strong> <strong>Incident</strong>s.Program PurposeThe purpose of this <strong>Plan</strong> is to prevent damage and/or loss toInstitutional Data, including Private Information, to prevent damage toIU Information Technology and to place IU in compliance with its legalobligations.Section headings are:1. DEFIN<strong>IT</strong>IONS2. IDENTIFICATION OF INCIDENT3. ESTABLISHMENT OF INCIDENT RESPONSE TEAM4. CONTAINING DAMAGE AND PRESERVING EVIDENCE5. INCIDENT RESPONSE REPORT6. ADD<strong>IT</strong>IONAL OBLIGATIONS OF INCIDENT RESPONSE TEAM7. INCIDENT PREVENTION8. MODIFICATIONS AND ADJUSTMENTS9. SPECIAL S<strong>IT</strong>UATIONS/EXCEPTIONSI. DEFIN<strong>IT</strong>IONS“Data <strong>Security</strong> <strong>Incident</strong>” occurs when there is a serious threat of or unauthorizedaccess or acquisition to IU Information Technology or a User’s computerized data thatcompromises the security, confidentiality, or integrity of the information, includingInstitutional Data and Private Information. A Data <strong>Security</strong> <strong>Incident</strong> also occurs wherethere has been unauthorized access or acquisition of encrypted data and the confidentialprocess or key to the encryption is also compromised. Data <strong>Security</strong> <strong>Incident</strong>s canrange from the unauthorized use of another User’s account or system privileges to theexecution of malicious code, viruses, worms, trojan horses, cracking utilities, or attacksby crackers or hackers. Data <strong>Security</strong> <strong>Incident</strong>s may also involve the physical theft of IUInformation Technology or a User’s technology, such as a computer or other electronicmedia, or may occur as the result of a weakness in information systems or components(e.g., hardware design or system security procedures). A non-exhaustive list ofsymptoms of incidents that qualify as Data <strong>Security</strong> <strong>Incident</strong>s include: a system alarm orsimilar indication from an intrusion detection tool; suspicious entries in a system orDM3\956481.7-1-


“User” includes any individuals, entities such as third party hosting contractors, staff,faculty, or employed students, given electronic access to IU’s Institutional Data and/orusing IU Information Technology.II.IDENTIFICATION OF INCIDENTAny User or individual or organization not affiliated with IU may refer a Data <strong>Security</strong><strong>Incident</strong> to the Program Officer. The Program Officer and his or her personnel canidentify a Data <strong>Security</strong> <strong>Incident</strong> through proactive monitoring of IU’s network andinformation system activities.III.ESTABLISHMENT OF INCIDENT RESPONSE TEAMThe Program Officer shall assemble, manage, maintain, train and lead the <strong>Incident</strong><strong>Response</strong> Team.IV.CONTAINING DAMAGE AND PRESERVING EVIDENCEFollowing a Data <strong>Security</strong> Breach the <strong>Incident</strong> <strong>Response</strong> Team will:• Review the circumstances and the actions taken;• Assign roles;• Create a plan of action to contain damage and gather evidence; and• Ensure that wherever possible, a forensic copy of the affectedcomputer hard drive or server database is created.The <strong>Incident</strong> <strong>Response</strong> Team will work with the appropriate staff and OTS to takewhatever actions are necessary to ensure that no additional Institutional Data is lost ortaken and/or that no additional Information Technology is exploited.V. INCIDENT RESPONSE REPORTThe <strong>Incident</strong> <strong>Response</strong> Team will ensure that Data <strong>Security</strong> <strong>Incident</strong>s are appropriatelylogged and archived. To that end, following any Data <strong>Security</strong> <strong>Incident</strong>, the <strong>Incident</strong><strong>Response</strong> team must produce an <strong>Incident</strong> <strong>Response</strong> Report (a “Report”) as outlined inthis Section V of the <strong>Plan</strong>. Any Data <strong>Security</strong> <strong>Incident</strong>s involving Electronic ProtectedHealth Information (“ePHI”) pursuant to the Health Insurance Portability andAccountability Act (“HIPAA”) will be so identified in the Report.The <strong>Incident</strong> <strong>Response</strong> Team will be responsible for communicating the <strong>Incident</strong> toappropriate IU personnel and maintaining contact, for the purpose of update andinstruction, for the duration of the <strong>Incident</strong>.DM3\956481.7-3-


Each Report should include at a minimum the following:• A description of the Data <strong>Security</strong> <strong>Incident</strong>;• Type of Institutional Data or other information exposed and/orpotentially at risk of exposure from the Data <strong>Security</strong> <strong>Incident</strong>;• Type of IU Information Technology damaged or potentially at riskof damage or loss due to the Data <strong>Security</strong> <strong>Incident</strong>;• Steps taken for containment of the Data <strong>Security</strong> <strong>Incident</strong>;• Steps taken for remediation of the Data <strong>Security</strong> <strong>Incident</strong>;• Logging of all internal and external communications issued,including all emails and phone calls regarding the Data <strong>Security</strong><strong>Incident</strong>;• Interactions with law enforcement and disciplinary authoritiesregarding the Data <strong>Security</strong> <strong>Incident</strong>; and• Legal obligations and actions taken to satisfy those legalobligations regarding the Data <strong>Security</strong> <strong>Incident</strong>.VI.ADD<strong>IT</strong>IONAL OBLIGATIONS OF INCIDENT RESPONSE TEAMSimultaneous with the creation of the Report and containment of the Data <strong>Security</strong><strong>Incident</strong>, the <strong>Incident</strong> <strong>Response</strong> team must:• Determine how the Data <strong>Security</strong> <strong>Incident</strong> occurred and takeimmediate remedial action to prevent it from occurring again;• If the breach involves a User, contact the appropriate disciplinaryoffice, including the local police if appropriate;• Collaborate with IU’s outside counsel to determine and thenperform IU’s obligations to affected persons and parties;• Collaborate with the President to manage public relationscommunications effectively regarding the Data <strong>Security</strong> <strong>Incident</strong>;and• Rebuild all comprised IU Information Technology and closelymonitor the rebuilt systems.VII.INCIDENT PREVENTIONDM3\956481.7-4-


Wherever possible and in conjunction with the application of other IU policies relating toinformation security, IU will undertake to prevent Data <strong>Security</strong> <strong>Incident</strong>s by monitoringand scanning its own network for anomalies, and developing clear protection proceduresfor the configuration of its Information Technology and other related resources.VIII. MODIFICATIONS AND ADJUSTMENTSThis <strong>Plan</strong> and its procedures will be reviewed periodically to adjust processes, identifynew risks and remediations.IX.SPECIAL S<strong>IT</strong>UATIONS/EXCEPTIONSAny personally-owned devices, such as PDAs, phones, wireless devices or otherelectronic transmitters which have been used to store Institutional Data and aredetermined to have contributed to a Data <strong>Security</strong> <strong>Incident</strong>, may be subject to seizureand retention by IU authorities until the Data <strong>Security</strong> <strong>Incident</strong> has been remediated,unless the custody of these devices is required as evidence for a court case. By usingthese devices within the IU network for business purposes, individuals are subject to IUpolicies restricting their use such as the IU Acceptable Use Policy.DM3\956481.7-5-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!