Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The WVU Information Security Policy identifies that Information Technology Services is responsible for establishing the rules to safeguard the hardware, software, and information systems utilized at WVU. The governance established by ITS applies to all units, faculty, staff, affiliates, and vendors with access to WVU systems and data. In support of a risk-based approach to security, WVU will classify information systems in one of three security categories and provide the minimum security requirements within each category. At a high level, the security category of an information system is based on the type of data within the system and its criticality to the operations of the University.

System Criticality

Data Classification

Sensitive

Confidential

Internal

Public

Mission Critical

Level 3HighLevel 3

High

Level 3HighLevel 3

High

Core

Level 3High

Level 2ModerateLevel 2

Moderate

Level 2 Moderate

Business Critical

Level 3High

Level 2ModerateLevel 2

Moderate

Level 1Low

Operational

Level 3High

Level 2 Moderate

Level 1 LowLevel 1

Low

The WVU Data Classification Policy establishes the rules that govern the classification of information generated through the academic, administrative, research, and outreach activities conducted at WVU into four categories: Sensitive, Confidential, Internal, and Public. The WVU Information Security Policy identifies that Information Technology Services is responsible for establishing the rules to safeguard the hardware, software, and information systems utilized at WVU. The governance established by ITS applies to all units, faculty, staff, affiliates, and vendors with access to WVU systems and data. The table below identifies the minimum security requirements for a WVU system or application based on the classification of the data stored within the system and/or the system’s criticality. Security requirements are based on implemented technology governance and are organized below based on the NIST Cybersecurity Frameworkthe criticality of information systems into four categories: mission critical, core, business critical, and operational.

For assistance classifying the information system you manage, review the information provided in the Security Objectives section or contact Information Security Services at infosec@mail.wvu.edu.

Security Objectives

The Security Category = [Confidentiality impact + Integrity impact + Availability impact]

...

Level 1 - Low

Level 2 - Moderate

Level 3 - High

Impact on WVU’s mission

None

No impact

Potential impact

Impact on WVU’s reputation

At most a minimal risk

Moderate risk

Significant risk

Impact on WVU’s finances

None

Mild impact

Significant impact

Risk to the security of other systems protecting data

None

Mild impact

Significant impact

Risk to life safety

None

None

Potential risk

Data Classification

Public

Internal/Confidential

Confidential/Sensitive

The table below identifies the minimum security requirements for a WVU system or application based on the classification of the data stored within the system and/or the system’s criticality. Security requirements are based on implemented technology governance and are organized below based on the NIST Cybersecurity Framework

Table of Contents
Info

Icon Key: (tick) Required ☑ Recommended (error) Prohibited⬜ Not Required

...