Document Citation: 1 TAC § 202.70

Header:
TEXAS ADMINISTRATIVE CODE
TITLE 1. ADMINISTRATION
PART 10. DEPARTMENT OF INFORMATION RESOURCES
CHAPTER 202. INFORMATION SECURITY STANDARDS
SUBCHAPTER C. SECURITY STANDARDS FOR INSTITUTIONS OF HIGHER EDUCATION


Date:
08/31/2009

Document:

§ 202.70. Security Standards Policy

The following are policies of the State of Texas that apply to all state institutions of higher education. Each institution of higher education should apply the Security Standards Policy based on documented risk management decisions:

(1) Information resources residing in the various institutions of higher education of state government are strategic and vital assets belonging to the people of Texas. These assets shall be available and protected commensurate with the value of the assets. Measures shall be taken to protect these assets against unauthorized access, disclosure, modification or destruction, whether accidental or deliberate, as well as to assure the availability, integrity, utility, authenticity, and confidentiality of information. Access to state information resources shall be appropriately managed.

(2) All institutions of higher education are required to have an information resources security program consistent with these standards, and the institution of higher education head is responsible for the protection of information resources.

(3) All individuals are accountable for their actions relating to information resources. Information resources shall be used only for intended purposes as defined by the institution of higher education and consistent with applicable laws.

(4) Risks to information resources shall be managed. The expense of security safeguards shall be commensurate with the value of the assets being protected.

(5) The integrity of data, its source, its destination, and processes applied to it shall be assured. Changes to data shall be made only in an authorized manner.

(6) Information resources shall be available when needed. Continuity of information resources supporting critical governmental services shall be ensured in the event of a disaster or business disruption.

(7) Security requirements shall be identified, documented, and addressed in all phases of development or acquisition of information resources.

(8) Institutions of higher education shall ensure adequate controls and separation of duties for tasks that are susceptible to fraudulent or other unauthorized activity.