Skip Navigation
Skip to Menu Toggle Button
UMGC Policy X-1.22

System and Information Integrity

Policy CategoryPolicy OwnerVersion Effective DateReview CyclePolicy Contact
X. Information Governance, Security & TechnologyChief Transformation OfficerAugust 29, 2023Every 2 yearsinfosec@umgc.edu
  1. Purpose

    The purpose of this policy is to establish information security standards for the System and Information Integrity processes relevant to University of Maryland Global Campus ("UMGC" or "University") Information Technology Resources.

  2. Scope and Applicability

    This policy applies to all University Information Systems and Information Technology Resources. All Information System Stewards and their designees are responsible for adhering to this policy.

  3. Definitions

    Defined terms are capitalized throughout this Policy and can be found in the Information Governance Glossary.

  4. System and Information Integrity

    Information System Stewards or their designee must adhere to the University's System and Information Integrity Policy to ensure that University Information Systems are updated with security patches to prevent malware infections, to ensure that anti-malware software is deployed, and that e-mail systems are monitored and protected to detect malicious activity.

    1. Information System flaws must be identified, reported, and corrected in a timely manner. The University must have a process to review relevant vendor announcements regarding weaknesses, vulnerabilities, and/or flaws. After reviewing the information, the Information System Stewards must execute a process called patch management that allows for systems to be updated without adversely affecting the organization.
    2. Protection from malicious code (e.g. malware) must be provided at appropriate locations within University Information Systems. Malicious code is program code that purposefully creates an unauthorized function or process that will have a negative impact on the confidentiality, integrity, or availability of an information system. Malicious code may include viruses, spyware, and trojan horses.
    3. Malicious code protection mechanisms must be updated when new releases are available.
    4. Periodic scans of the Information System and real-time scans of files from external sources as files are downloaded, opened, or executed must be performed.
    5. Information System security alerts and advisories must be monitored and where necessary acted upon.
    6. University Information Systems, including inbound and outbound communications traffic, must be monitored to detect attacks and indicators of potential attacks.
    7. Unauthorized use of University Information Systems must be identified. Information System Stewards can monitor systems by observing audit activities such as intrusion detection systems, intrusion prevention systems, and malicious code protection software.
    8. Spam protection mechanisms must be employed at Information System access entry and exit points.
    9. Email forgery protections must be implemented to prevent compromised accounts through attacks such as phishing and spam.
    10. Sandboxing must be utilized to detect or block potentially malicious email.
  5. Exceptions

    Exceptions to this policy should be submitted to Information Security for review and approval. If an exception is requested a compensating control or safeguard should be documented and approved.

  6. Enforcement
    1. Any Employee, Contractor, or third-party performing duties on behalf of the University with knowledge of an alleged violation of this Policy shall notify Information Security as soon as practicable.
    2. Any Employee, Contractor, or other third-party performing duties on behalf of the University who violates this Policy may be denied access to Information Resources and may be subject to disciplinary action, up to and including termination of employment or contract or pursuit of legal action.
  7. Standards Referenced
    1. USM IT Security Standards, v.5, dated July 2022
    2. NIST SP 800-171r2 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations,” dated February 2020
    3. Cybersecurity Maturity Model Certification (CMMC), v.2.0, December, 2021
  8. Related Policies
    1. UMGC Information Governance, Security, and Technology Policies
  9. Effective Date

    This policy is effective as of the Version Effective Date set forth above.