Skip Navigation
University of Maryland Global Campus University of Maryland Global Campus
  • Locations
    • U.S. Locations
    • UMGC Asia
    • UMGC Europe
    • Learn Online
  • Get Help
    • Find Answers
    • Chat Now
    • Email Us
  • 855-655-8682
  • Current Students
Login
Request Info
Apply Now
  • Leadership & Governance
    Leadership & Governance
    • Office of the President
    • Strategic Plan
    • Boards and Committees
    • Executive Committee
    • Maryland Cybersecurity Council
    • Shared Governance
    • Academic Advisory Board
    • Adjunct Faculty Association
    • Student Advisory Council
    Related Links
    • Awards and Recognition
    • Mission and History
    • Regional Accreditation
    • University System of Maryland Membership
  • Arts
    Arts
    • Arts Program
    • Art Exhibitions
    • Art Collections
    • Art Talks
    • Art Galleries and Hours
    • UMGC TV
  • Policies & Reporting
    Policies & Reporting
    • Institutional Data
    • Facts at a Glance
    • Fact Book and Fact Sheet Archive
    • Policies
    • Academic Affairs Policies
    • Administration Policies
    • External Relations Policies
    • Faculty Policies
    • Fiscal and Business Affairs Policies
    • General Policies
    • Human Resources Policies
    • Info Governance, Security & Technology Policies
    • Research Policies
    • Student Affairs Policies
    • Fair Practices
    • Sexual Misconduct (Title IX)
    • Suspected Child Abuse and Neglect
  • Jobs At UMGC
    Jobs At UMGC
    • Apply for a Job
    • Who We Are
    • Culture
    • Faculty Careers
    • Professional Careers
    • Benefits
    • Careers FAQs
    • Community Engagement
    • New Hire Orientation
    • New Hire Onboarding
    • Benefits Enrollment Information
    • Retirement Enrollment Information
  • UMGC Blog
  • UMGC Podcast
    • U.S. Locations
    • UMGC Asia
    • UMGC Europe
    • Learn Online
    • Find Answers
    • Chat Now
    • Email Us
  • 855-655-8682
  • Current Students
Request Info
Apply Now
Skip to Menu Toggle Button

UMGC Policy X-1.22 UMGC Policy on System and Information Integrity

  1. University of Maryland Global Campus
  2. Administration
  3. Policies & Reporting
  4. Policies
  5. Info Governance, Security, & Technology Policies
  6. System and Information Integrity

EXPLORE MORE OF UMGC

  • Administration
    • Policies & Reporting
      • Policies
        • Info Governance, Security, & Technology Policies
Policy CategoryPolicy OwnerVersion Effective DateReview CycleLast ReviewedPolicy Contact
X. Information Governance, Security & TechnologySVP, General Counsel, and Chief People OfficerAugust 29, 2023Every 2 yearsApril 28, 2025Information Governance
  1. Purpose
    The purpose of this Policy is to establish information security standards for the System and Information Integrity processes relevant to University of Maryland Global Information Technology Resources.
  2. Scope and Applicability
    This Policy applies to all University Information Systems and Information Technology Resources. All Information System Stewards and their designees are responsible for adhering to this Policy.
  3. Definitions
    Defined terms are capitalized throughout this Policy and can be found in the Information Governance Glossary.
  4. System and Information Integrity
    Information System Stewards or their designee must adhere to the University's System and Information Integrity Policy to ensure that University Information Systems are updated with security patches to prevent malware infections, to ensure that anti-malware software is deployed, and that e-mail systems are monitored and protected to detect malicious activity.
    1. Information System flaws must be identified, reported, and corrected in a timely manner. The University must have a process to review relevant vendor announcements regarding weaknesses, vulnerabilities, and/or flaws. After reviewing the information, the Information System Stewards must execute a process called patch management that allows for systems to be updated without adversely affecting the organization.
    2. Protection from malicious code (e.g. malware) must be provided at appropriate locations within University Information Systems. Malicious code is program code that purposefully creates an unauthorized function or process that will have a negative impact on the confidentiality, integrity, or availability of an information system. Malicious code may include viruses, spyware, and trojan horses.
    3. Information System security alerts and advisories must be monitored and where necessary acted upon.
    4. Malicious code protection mechanisms must be updated when new releases are available.
    5. Periodic scans of the Information System and real-time scans of files from external sources as files are downloaded, opened, or executed must be performed.
    6. University Information Systems, including inbound and outbound communications traffic, must be monitored to detect attacks and indicators of potential attacks.
    7. Unauthorized use of University Information Systems must be identified. Information System Stewards can monitor systems by observing audit activities such as intrusion detection systems, intrusion prevention systems, and malicious code protection software.
    8. Spam protection mechanisms must be employed at Information System access entry and exit points.
    9. Email forgery protections must be implemented to prevent compromised accounts through attacks such as phishing and spam.
    10. Sandboxing must be utilized to detect or block potentially malicious email.
  5. Exceptions
    Exceptions to this policy should be submitted to Information Security for review and approval. If an exception is requested a compensating control or safeguard should be documented and approved.
  6. Enforcement
    1. Any Employee, Contractor, or third-party performing duties on behalf of the University with knowledge of an alleged violation of this Policy shall notify Information Security as soon as practicable.
    2. Any Employee, Contractor, or other third-party performing duties on behalf of the University who violates this Policy may be denied access to Information Resources and may be subject to disciplinary action, up to and including termination of employment or contract or pursuit of legal action.
  7. Standards Referenced
    1. Most recent versions:
      1. USM IT Security Standards
      2. NIST SP 800-171 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations”
      3. Cybersecurity Maturity Model Certification (CMMC)
  8. Related Policies
    1. UMGC Information Governance, Security, and Technology Policies
Request Info
Apply Now
Quick Links
  • Academic Calendar
  • Schedule of Classes
  • Submit Transcripts
  • Request Transcripts
  • Library
  • Events
  • News
  • Administration
  • University Store
  • FERPA
UMGC For
  • Prospective Students
  • Military & Veterans
  • Current Students
  • Partners
  • Alumni
  • Donors
  • Media
  • Job Seekers
Contact Us

855-655-8682
Help Center
More Contact Options
Social Links

Mailing Address
No classes or services at this location
3501 University Blvd. East,
Adelphi, MD 20783

  • Academic Calendar
  • Schedule of Classes
  • Submit Transcripts
  • Request Transcripts
  • Library
  • Events
  • News
  • Administration
  • University Store
  • FERPA
  • Prospective Students
  • Military & Veterans
  • Current Students
  • Partners
  • Alumni
  • Donors
  • Media
  • Job Seekers

855-655-8682
Help Center
More Contact Options
Social Links

Mailing Address
No classes or services at this location
3501 University Blvd. East,
Adelphi, MD 20783

University of Maryland Global Campus
UMGC is a proud member of the University System of Maryland.

Accessibility Terms & Conditions Consumer Disclosures & Policies Privacy Policy Social Media Guidelines Media Protection Title IX/Sexual Misconduct Report Fraud, Waste & Abuse Sitemap
The appearance of U.S. Department of Defense visual information does not imply or constitute DOD endorsement.
Copyright © 2025 University of Maryland Global Campus. All Rights Reserved.

By using our website you agree to our use of cookies. Learn more about how we use cookies by reading our Privacy Policy.

|