Skip Navigation
Skip to Menu Toggle Button

UMGC Policy X-1.22 UMGC Policy on System and Information Integrity

Policy CategoryPolicy OwnerVersion Effective DateReview CycleLast ReviewedPolicy Contact
X. Information Governance, Security & TechnologySVP, General Counsel, and Chief People OfficerAug. 29, 2023Every 2 yearsApr. 28, 2025UMGC Info. Security
  1. Purpose
    The purpose of this Policy is to establish information security standards for the System and Information Integrity processes relevant to University of Maryland Global Information Technology Resources.
  2. Scope and Applicability
    This Policy applies to all University Information Systems and Information Technology Resources. All Information System Stewards and their designees are responsible for adhering to this Policy.
  3. Definitions
    Defined terms are capitalized throughout this Policy and can be found in the Information Governance Glossary.
  4. System and Information Integrity
    Information System Stewards or their designee must adhere to the University's System and Information Integrity Policy to ensure that University Information Systems are updated with security patches to prevent malware infections, to ensure that anti-malware software is deployed, and that e-mail systems are monitored and protected to detect malicious activity.
    1. Information System flaws must be identified, reported, and corrected in a timely manner. The University must have a process to review relevant vendor announcements regarding weaknesses, vulnerabilities, and/or flaws. After reviewing the information, the Information System Stewards must execute a process called patch management that allows for systems to be updated without adversely affecting the organization.
    2. Protection from malicious code (e.g. malware) must be provided at appropriate locations within University Information Systems. Malicious code is program code that purposefully creates an unauthorized function or process that will have a negative impact on the confidentiality, integrity, or availability of an information system. Malicious code may include viruses, spyware, and trojan horses.
    3. Information System security alerts and advisories must be monitored and where necessary acted upon.
    4. Malicious code protection mechanisms must be updated when new releases are available.
    5. Periodic scans of the Information System and real-time scans of files from external sources as files are downloaded, opened, or executed must be performed.
    6. University Information Systems, including inbound and outbound communications traffic, must be monitored to detect attacks and indicators of potential attacks.
    7. Unauthorized use of University Information Systems must be identified. Information System Stewards can monitor systems by observing audit activities such as intrusion detection systems, intrusion prevention systems, and malicious code protection software.
    8. Spam protection mechanisms must be employed at Information System access entry and exit points.
    9. Email forgery protections must be implemented to prevent compromised accounts through attacks such as phishing and spam.
    10. Sandboxing must be utilized to detect or block potentially malicious email.
  5. Exceptions
    Exceptions to this policy should be submitted to Information Security for review and approval. If an exception is requested a compensating control or safeguard should be documented and approved.
  6. Enforcement
    1. Any Employee, Contractor, or third-party performing duties on behalf of the University with knowledge of an alleged violation of this Policy shall notify Information Security as soon as practicable.
    2. Any Employee, Contractor, or other third-party performing duties on behalf of the University who violates this Policy may be denied access to Information Resources and may be subject to disciplinary action, up to and including termination of employment or contract or pursuit of legal action.
  7. Standards Referenced
    1. Most recent versions:
      1. USM IT Security Standards
      2. NIST SP 800-171 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations”
      3. Cybersecurity Maturity Model Certification (CMMC)
  8. Related Policies
    1. UMGC Information Governance, Security, and Technology Policies