Policy information: IT-12 Awareness and Training (AT) Standard
About this Standard
Status: Effective July 9, 2024
Responsible University Office: University Information Policy Office
Responsible University Administrator: Office of the Vice President for Information Technology and Chief Information Officer
Contact: University Information Security Office uiso@iu.edu
Scope
This standard supports Policy IT-12 (Security of Information Technology Resources) and applies to all Indiana University information technology resources, regardless of whether those resources are managed by the university or provisioned from third parties on behalf of the university, and to all users of those resources regardless of affiliation.
Objectives
The key objective of this standard is to mitigate risk by ensuring that:
- Ongoing security awareness training is provided to those who manage institutional data, including an awareness of the security risks and how to comply with applicable laws, regulations, policies, standards, and procedures.
- Employees understand their responsibilities in protecting the university’s information and are adequately trained to carry out their assigned information security-related duties and responsibilities; and
- A system and/or process is in place to track training requirements.
The university’s information security awareness program aims to deliver information about risks and security practices so that IU employees understand how to protect the confidentiality, integrity, and availability of systems and data. The purpose of the training is to inform employees about known threats, procedures for reporting a security incident, the types of data IU collects, how that data is classified, and what their data handling responsibilities are as employees of the university.
IU community members are responsible for:
- Completing assigned information security awareness course(s);
- Following safe computing practices as outlined in the Acceptable Use Agreement;
- Reviewing university information security policies; and
- Completing additional security and data compliance training related to their job.
Standard
The following tables detail baseline security controls for awareness and training that are to be applied to a particular information technology resource based on its security categorization. Select controls as applicable. For example, all controls may not apply to every system component or technology, or to situations governed by specific regulations.
Control: | Security Awareness Training | ||
Required for: | High | ||
IU Implementation | Provide security awareness training to employees who manage institutional data and access IU’s enterprise systems to ensure they understand their responsibilities to safeguard the data they manage, how to safeguard that data, what data poses risk to the university, and how to report an incident if unauthorized access does occur. Those responsible for the training must review the content annually to ensure it is adequately maintained and addresses the following:
| ||
Notes | Required: For more, see https://datamanagement.iu.edu/training/index.html. Optional: | ||
NIST Cross Reference | AT-2 |
Control: | Role-based Security Training | ||
Required for: | High | ||
IU Implementation | Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards. Institutions determine the appropriate content of security training based on the assigned roles and responsibilities of individuals, the specific security requirements of organizations, and the information systems to which employees have authorized access.
| ||
Notes |
| ||
NIST Cross Reference | AT-3 |
Control: | Tracking Successful Completion of Training Requirements | ||
Required for: | High | ||
IU Implementation |
| ||
Notes | Tools for reviewing compliance training:
| ||
NIST Cross Reference | AT-4 |
Definitions
Standard – Standards (like procedures) support policy by further describing specific implementation details (i.e., the "how"). A standard can be thought of as an extension of policy that articulates the rules, mechanisms, technical or procedural requirements, or specifications to be used in carrying out/complying with policy. Standards, along with procedures, promote a consistent approach to following policy. Standards make policies more practically meaningful and effective. Standards are definitional and clarifying in nature, specifying the minimums necessary to meet policy objectives. Because standards directly support policies, compliance with standards is nonoptional and failure to follow standards may result in sanctions imposed by the appropriate university office.
Sanctions
Indiana University will handle reports of misuse and abuse of information and information technology resources in accordance with existing policies and procedures issued by appropriate authorities. Depending on the individual and circumstances involved, this could include the Office of Human Resources, Vice Provost or Vice Chancellor of Faculties (or campus equivalent), Dean of Students (or campus equivalent), Office of the Vice President and General Counsel, and/or appropriate law enforcement agencies. See Policy IT-02 (Misuse and Abuse of Information Technology Resources) for more details.
Failure to comply with Indiana University information technology policies may result in sanctions relating to the individual's use of information technology resources (such as suspension or termination of access, or removal of online material); the individual's employment (up to and including immediate termination of employment in accordance with applicable university policy); the individual's studies within the university (such as student discipline in accordance with applicable university policy); civil or criminal liability; or any combination of these.
Additional Contacts
Subject | Contact | Phone | |
---|---|---|---|
Questions about the standard | University Information Security Office | 812-855-UISO (8476) |
History
Initial Draft – February 12, 2022
Revised – April 7, 2023
Effective – July 9, 2024