Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Panel

Document Name: NCSA Information Security Policy
Version: 2.12
Accountable: Alex Withers James Eyrich
Authors: Adam Slagell, Alex Withers

Reviewed: June 23August 22, 20212023
Approved: Oct. 4, 2019August 24,2023 by IIB

Table of Contents
outlinetrue

...

NCSA accounts may or may not be deactivated, depending on the role the person maintains with the Center. However, if they are departing staff, they must be removed from all staff groups in NCSA authorization systems and staff email lists. They will also be removed from any other NCSA email lists unless the list owner actively approves of their continued membership.

Security Controls

Additionally, departing staff must acknowledge the NCSA Acceptable Use Policy, which includes a confidentiality agreement for workforce members with access to sensitive data, to ensure employees are reminded of their obligation to not discuss sensitive information after employment.

Security Controls

NCSA prescribes security controls consummate with the risk level of the NCSA prescribes security controls consummate with the risk level of the information systems.  Current controls are in place to prevent, detect, contain, respond to, and/or otherwise recover from security incidents. These controls are found in the following security policy documents:

...

Policies, standards, guidelines, and procedures developed by the NCSA Security Office are linked to from https://wiki.ncsa.illinois.edu/display/cybersec/Policies+and+Procedures

...

Children Display
alltrue
pagePolicies and Procedures

...

Other Resources

  1. University of Illinois Ethics Office (www.ethics.uillinois.edu)
  2. Illinois Freedom of Information Act (www.uillinois.edu/foia)