Skip Navigation
Skip to Menu Toggle Button
UMGC Policy X-1.05

Information Security Awareness and Training

Policy Category Policy No. & Title Policy Owner Effective Date Revision Number Revision Eff. Date Review Cycle
Information Governance, Security & Technology
Information Security Awareness & Training
VP of Information Security July 1, 2021 N/A N/A Every 3 years
  1. Purpose

    The purpose of this policy is to establish the minimum requirements for the University's Security Awareness and Training Program. The Security Awareness and Training Program aims to strengthen the University's overall security posture through the education of basic cybersecurity best practices, informing and highlighting the responsibilities of Employees regarding their Information Security obligations, and raising awareness around University Information Security policies, procedures, and standards. As members of the UMGC community, Employees have an obligation to demonstrate an understanding of security awareness as it applies to their unique role and responsibility as the best defense to ensure the protection of the University's information, data, and reputation.

  2. Scope and Applicability

    This policy and its supporting standards and procedures apply to all Employees that use University Information Systems and Information Resources.

  3. Definitions

    Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.

    1. Confidential Data: Data that requires restrictions on access and disclosure, including the protection of personal privacy and proprietary information.

    2. Data Owner: The UMGC employees, or designees, who are responsible for determining User access and assigning Data Classifications to data originating from or residing in their respective business units.

    3. Employee: University staff and faculty, including nonexempt, exempt, and overseas staff and collegiate faculty

    4. Information Resource: Anything that is intended to generate, store, or transmit Information.

    5. Information Security: The protection of Information and Information Systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

    6. Information Security Program: Provides a formal structure for (1) developing and maintaining University-wide security policies, (2) defines security principles that safeguard University computing resources, and (3) ensures compliance with internal and external regulations.

    7. Information Systems: Inter-related components of Information Resources working together for the collection, processing, maintenance, use, sharing, dissemination, or disposition of Information.

    8. Privileged User: A user that is authorized to perform security-relevant functions that ordinary users are not authorized to perform.

    9. Supervisor: An individual who has the authority to give instruction to an Employee or Contractor and can be held accountable for the Employee or Contractor's work and actions.

    10. University: University of Maryland Global Campus

    11. User: A University community member, including but not limited to, staff, faculty, students, alumni, and individuals working on behalf of the University, including third party vendors, Contractors, consultants, volunteers, and other individuals who may have a need to access, use, or control University Data.

  4. Information Security Awareness & Training
    1. The University Information Security Program is responsible for the information security awareness program, training, education, and awareness communication for the University.
    2. Employees and Contractors must take security awareness training within 90 days of their hire date when required by information system changes, and at least annually or as determined by the VP, Information Security thereafter.
    3. Supervisor shall ensure Employees and Contractors complete their Security Awareness Training requirements.
    4. Additional specialized or role-based security training may be required for Users who:
      1. Have Privileged User access
      2. Have access to Confidential Data
    5. The University Information Security Program will coordinate, monitor, and track completion of the required Security Awareness Program.
    6. Training Records shall be retained for a period as defined by the University's records retention policy.
    7. Program training will be reviewed annually in order to assure content trains on relevant and evolving information security.
  5. Exceptions

    Exceptions to this policy must be submitted to the VP of Information Security for review and approval.

  6. Enforcement
    1. Suspected violations will be investigated and may result in disciplinary action in accordance with University codes of conduct, policies, or applicable laws. Sanctions may include one or more of the following:
      1. Suspension or termination of access
      2. Removal of devices determined to be using the University's Information Resources inappropriately or in violation of the Acceptable Use Policy
      3. Disciplinary action, up to and including termination of employment
      4. Termination of contract
      5. Student discipline in accordance with applicable University policies
      6. Civil or criminal penalties
    2. Report suspected violations of this policy to, or to the appropriate Data Owner. Reports of violations are considered Confidential Data until otherwise classified.
    3. UMGC reserves the right to disconnect any resource from UMGC networks until suspected Security Incidents are resolved.
  7. Related Policies
    1. Acceptable Use
    2. Account Management
    3. Data Classification
    4. Information Security
    5. Information Security Incident Response
  8. Effective Date: This policy is effective as of the Effective Date set forth above and supersedes all prior policies on the subject matter hereof.