1. Purpose

    Implementation of physical, environmental, and logical security measures help to protect the privacy, security, and confidentiality of university systems, information, and information resources from unauthorized access.
  2. Scope

    The scope applies to all academic and operational departments and offices at all Winston-Salem State University locations, owned and leased and all University faculty, staff, students, visitors and contractors and covers the physical and logical access to all university systems, especially highly sensitive systems, and the responsibilities of institutional units and individuals for such systems.
  3. Protection of Information Resources

    Protecting information resources includes:
    1. Physical protection of information processing facilities and equipment
    2. Assurance that application and data integrity are maintained
    3. Assurance that information systems perform their critical functions correctly, in a timely manner, and under adequate controls
    4. Protection against unauthorized access to protected data through logical access controls
    5. Protection against unauthorized disclosure of information
    6. Assurance that systems continue to be available for reliable and critical information
    7. Assurance that the security and forensic needs of the university are met
    8. Additionally, information entered, processed, stored, generated, or disseminated by information systems must be protected from internal data or programming errors and from misuse by individuals inside or outside the university. Specifically, the information must be protected from unauthorized or accidental modification, destruction, or disclosure. Proper account management procedures, security monitoring, and logging practices are required to provide this type of protection of data.
  4. Secure areas
    1. Winston-Salem State University’s (WSSU) Office Information Technology (OIT) must document and manage physical security for mission critical information resources to ensure confidentiality, integrity, and availability of information resources.
    2. All information processing facilities must be protected by physical controls that are appropriate for the size and complexity of the operations and the criticality, sensitivity, regulatory compliance requirements and risks to the systems or services operated at those locations.
      1. All enterprise data processing facilities that process or store data classified as critical or sensitive should have multiple layers of physical security. Each layer should be independent and separate of the preceding and/or following layer(s).
      2. All other processing facilities should have, at a minimum, a single security perimeter protecting it from unauthorized access, damage and/or interference.
    3. Work areas must be protected in accordance with physical controls and security requirements that are appropriate for the classification and value of the data being handled or processed and the type of operational functions performed in the area. University departments and OIT shall develop procedures to distinguish between onsite personnel and visitors in sensitive areas.
    4. Physical security and emergency procedures for information resources must be documented, tested, and reviewed as part of the risk assessment process.
    5. Access points such as delivery and loading areas and other points where unauthorized persons could enter the premises should be controlled, and if possible, isolated from information processing facilities.
  5. Equipment
    1. Equipment should be located in secured areas or protected to reduce the risks from environment threats and hazards and to reduce the opportunities for unauthorized access. Equipment located in areas where WSSU or OIT is unable to maintain a secure perimeter should be locked in a secured manner with access controlled by WSSU. Secure cabinets or facilities should support further segregation within the organization based on role and responsibility.
    2. Procedures for protecting mission critical information resources from environmental hazards, power failures, interception, interference, and other disruptions must be documented, updated, and tested at least annually.
    3. Designated employees shall be trained to monitor environmental control procedures and equipment and shall be trained in desired response in case of emergencies or equipment problems.
    4. Enterprise data processing facilities are to be equipped with security cameras to record activities in the parking lot and within the area encompassing the front entrance. All activities in these areas are recorded on a 24 hour a day 365 day per year basis.
    5. Fire Protection use is guided by local building codes and will be observed. Manufacturer’s recommendations on the fire protection of individual hardware will be followed.
    6. Equipment should be correctly maintained to ensure its continued availability and integrity.
    7. All equipment, software or information that is a part of WSSU operational systems or processes should not be taken off-site without the prior authorization from executive management or a designated representative and should be removed according to documented agency equipment transfer procedures.
    8. Security should be applied to off-site assets taking into account the different risks of working outside the organization’s premises.
    9. All data processing equipment including storage devices subject to transfer or reuse should be sanitized in accordance with the State of North Carolina’s media reuse procedure or superseding federal requirements. Data processing equipment assets that are not subject to transfer or reuse should be destroyed in accordance with the State of North Carolina’s media disposal procedures or in accordance with superseding federal requirements.
  6. Clear Desk and Clear Screen
    1. All data classified as confidential must be stored in a locked cabinet or room when unattended. All data processing equipment that provides access to Information Processing Systems will be configured so that a screen-saver, with password protection engaged, or another lock-down mechanism that prevents unauthorized viewing of screen information or unauthorized access to the system will automatically be implemented if the system has been left unattended.
    2. All computing platforms residing in non-secured facilities with attached displays should be oriented away from direct line of sight from unauthorized viewers.