Information Technology Regulation 514

Regulation 514 Approved: March 10, 2025
UNIVERSITY OF NORTH CAROLINA SCHOOL OF THE ARTS
Information Technology 
Regulation 514
Source of Authority: UNC System adoption of ISO/IEC 27002
ISO/IEC 27002:2013 8.2 Classification of Information
UNC System Policies 1400 Series on Information Technology
Revision Authority: Chancellor
History:

First Issued: March 10, 2025

Related Policies: Information Technology Security Regulation 512
Responsible Offices:

Office of Information Technology

Effective Date: March 10, 2025

1. Introduction

This Information Technology (IT) Regulation outlines the comprehensive approach for governing and managing IT resources, data security, compliance, and risk management at the University of North Carolina School of the Arts (UNCSA). It establishes the framework for ensuring the protection, privacy, and integrity of information systems, networks, and data, while adhering to applicable regulatory standards and best practices.
________________________________________

2. IT Governance and Oversight

Purpose: Ensure IT resources and services are aligned with the university’s goals and strategic objectives, while providing robust oversight of technology operations.

Related Standards:
• IT Governance and Risk Management Standard (UNCSA-ITG-001)
________________________________________

3. Data Protection and Security

Purpose: Safeguard sensitive data, including personally identifiable information (PII), protected health information (PHI), and financial records, from unauthorized access, misuse, or loss.

Key Requirements:
• Data must be classified, encrypted, and securely stored according to its sensitivity level.
• Data access must be limited to authorized users based on the principle of least privilege.

Related Standards:
Data Classification and Handling Standard (UNCSA-DCH-002)
Data Encryption Standard (UNCSA-DES-003)
________________________________________

4. Acceptable Use of IT Resources

Purpose: Define acceptable and unacceptable behaviors in the use of UNCSA’s IT resources.

Key Requirements:
• IT resources should only be used for academic, research, and administrative purposes.
• Prohibited activities include unauthorized access to systems, illegal content downloads, and misuse of university-owned devices.

Related Standards:
Acceptable Use Policy (UNCSA-AUP-005)
________________________________________

5. Access Control and Identity Management

Purpose: Implement access controls to ensure only authorized users can access sensitive or critical systems and data.

Key Requirements:
• Authentication mechanisms, including multi-factor authentication (MFA), must be employed.
• Role-based access control (RBAC) should be enforced to limit user access to systems based on their job responsibilities.

Related Standards:
• Access Control Standard (UNCSA-ACS-007)
• Password Management and Authentication Standard (UNCSA-PMAS-008)
________________________________________

6. Network and System Security

Purpose: Ensure the protection of networks and systems from unauthorized access, attacks, and other security threats.

Key Requirements:
• Implement firewalls, intrusion detection/prevention systems (IDS/IPS), and secure communication protocols.
• Regular patching of systems is required to protect against known vulnerabilities.

Related Standards:
System Configuration Standard (UNCSA-SCS-011)
Network Security Standard (UNCSA-NSS-013)
________________________________________

7. Incident Response and Reporting

Purpose: Establish a clear framework for responding to and reporting security incidents to minimize damage and ensure compliance with regulatory requirements.

Key Requirements:
• A formal incident response plan must be in place, including clear steps for containment, investigation, and remediation.
• All incidents must be reported to the IT Security Team promptly.

Related Standards:
Incident Response Plan (UNCSA-IRP-013)
________________________________________

8. IT Compliance and Legal Requirements

Purpose: Ensure compliance with all relevant laws, regulations, and industry standards, including GLBA, PCI-DSS, HIPAA, and other applicable requirements.

Key Requirements:
• Regular audits and assessments must be conducted to ensure compliance.
• Necessary training programs must be implemented to keep staff and students informed about compliance obligations.

Related Standards:
Compliance and Legal Requirements Standard (UNCSA-CLRS-027)
________________________________________

9. Employee and Student Training and Awareness

Purpose: Foster a culture of security awareness and ensure that all employees and students understand their responsibilities related to IT security and compliance.

Key Requirements:
• Mandatory cybersecurity training programs for employees, students, and contractors.
• Annual refresher courses to keep everyone up to date on the latest security practices.

Related Standards:
Security Awareness and Training Standard (UNCSA-SATS-014)
________________________________________

10. IT Policy Enforcement

Purpose: Ensure adherence to IT policies through monitoring, auditing, and enforcement mechanisms.

Key Requirements:
• Violations of IT policies will result in appropriate disciplinary actions.
• Regular audits and compliance checks will be conducted to ensure policy compliance.

Related Standards:
IT Policy Enforcement Standard (UNCSA-IPES-015)
________________________________________

11. Policy Review and Updates

Purpose: Ensure that IT policies remain current, effective, and aligned with institutional goals and regulatory requirements.

Key Requirements:
• Policies must be reviewed annually and updated as needed based on changes in technology, regulatory landscape, or business needs.

Related Standards:
• Policy Review and Update Standard (UNCSA-PRUS-016)
________________________________________

12. Wireless Network Security

Purpose: Secure the university’s wireless networks from unauthorized access and cyber threats.

Key Requirements:
• Wireless networks must use strong encryption protocols (e.g., WPA3).
• Guest networks should be isolated from internal systems and networks.

Related Standards:
• Wireless Network Security Standard (UNCSA-WNS-021)
________________________________________

13. Capacity Planning

Purpose: Ensure IT systems have sufficient capacity to handle current and future demands.

Key Requirements:
• Regular assessments must be conducted to evaluate system capacity and performance.
• A proactive approach should be taken to forecast future resource needs.

Related Standards:
• Capacity Planning Standard (UNCSA-CP-017)
________________________________________

14. Risk Assessment

Purpose: Identify, assess, and mitigate risks to IT systems and data.

Key Requirements:
• Regular risk assessments must be conducted to identify vulnerabilities.
• Mitigation strategies should be implemented to address identified risks.

Related Standards:
Risk Assessment Standard (UNCSA-RAS-018)
________________________________________

15. Sanitation and Secure Disposal of Technology Resources and Data

Purpose: Ensure that all technology resources and data are securely disposed of when they are no longer required.

Key Requirements:
• All data must be securely erased or destroyed before disposal.
• Technology resources must be sanitized to remove any residual data before disposal or repurpose.

Related Standards:
• Sanitation and Disposal Standard (UNCSA-SDS-019)
________________________________________

16. Secure Coding

Purpose: Ensure that all software development at UNCSA follows secure coding practices to minimize vulnerabilities.

Key Requirements:
• Developers must adhere to secure coding standards throughout the development lifecycle.
• Code must be regularly reviewed for security vulnerabilities.

Related Standards:
• Secure Coding Practices Standard (UNCSA-SCP-025)
________________________________________

17. Security Configurations

Purpose: Ensure systems and applications are securely configured to minimize vulnerabilities.

Key Requirements:
• Systems must be configured based on security best practices and hardened against attacks.
• Security patches must be applied regularly.

Related Standards:
• Security Configuration Management Standard (UNCSA-SCMS-026)
________________________________________

18. Vulnerability Management

Purpose: Regularly assess and address vulnerabilities in IT systems.

Key Requirements:
• Vulnerability scanning should be conducted on all systems, and identified vulnerabilities should be remediated promptly.
• Systems must be continuously monitored for potential security threats.

Related Standards:
Vulnerability Management Standard (UNCSA-VMS-027)
________________________________________

19. Media Protection

Purpose: Ensure that physical and digital media containing sensitive information is protected.

Key Requirements:
• Sensitive data on physical media must be securely encrypted or destroyed.
• Digital media must be protected with strong encryption methods.

Related Standards:
• Media Protection Standard (UNCSA-MPS-027)
________________________________________

20. Physical Security

Purpose: Safeguard physical IT resources from unauthorized access, theft, and damage.

Key Requirements:
• Data centers and server rooms must be secured with access controls.
• Proper environmental controls must be in place to prevent damage from fire, water, or other hazards.

Related Standards:
• Physical Security Standard (UNCSA-PSS-028)
________________________________________

21. Third-Party Supplier Risk Management

Purpose: Ensure third-party suppliers meet the university’s security standards and do not introduce risks to IT systems or data.

Key Requirements:
• Third-party suppliers must undergo risk assessments before being granted access to UNCSA systems.
• Contracts with third-party vendors must include security and compliance clauses.

Related Standards:
• Third-Party Risk Management Standard (UNCSA-TPRM-029)
________________________________________

22. Business Continuity Plan

Purpose: Ensure the availability and continuity of IT services in case of disruption.

Key Requirements:
• A comprehensive business continuity plan must be in place, outlining disaster recovery, backup strategies, and critical system restoration.
• Regular testing of the business continuity plan is required.

Related Standards:
• Business Continuity and Disaster Recovery Standard (UNCSA-BCDR-030)
________________________________________

23. Remote Access Controls

Purpose: Secure remote access to UNCSA IT systems and resources.

Key Requirements:
• Remote access must be provided through secure virtual private network (VPN) connections.
• Remote devices must meet security standards, including up-to-date antivirus and encryption.

Related Standards:
Remote Access Security Standard (UNCSA-RAS-029)
________________________________________

Conclusion

This IT Regulation document establishes the guidelines for the proper management, security, and use of IT resources at UNCSA. It is essential that all staff, students, contractors, and third-party vendors comply with these policies and the referenced standards to ensure the university’s technology infrastructure is secure, compliant, and resilient. Regular reviews and updates will be conducted to keep the policies aligned with evolving technology and regulatory requirements.