Skip Navigation LinksSFSC Home > College Procedures > College Procedure
Back to Index

South Florida State College
Administrative Procedures

Procedure: 2154

Title: Information Systems Security

Based on Policy: 2.15 - Safekeeping, Reproduction, and Destruction of Records

Office of Primary Responsibility: Vice President For Administrative Services/ Chief Information Officer

  1. Purpose:

To protect information assets from accidental or intentional but unauthorized disclosure, modification, or destruction or the inability to process that information

  1. Procedure:


    1. Security objectives
      1. Ensure the integrity and accuracy of the data
      2. Provide for privacy of proprietary, personal, privileged, or otherwise sensitive data
      3. Protect and conserve college information assets from natural and other hazards
      4. Ensure the ability to survive hazards
      5. Protect employees from unnecessary temptation to default on their responsibilities
      6. Protect innocent employees from suspicion in the event that another employee defaults on responsibilities
      7. Protect management from charges of imprudence if any compromise of security occurs
    1. Security policy

Security must begin with the establishment of a college-wide policy by the highest levels of management in the organization.  This policy will set the direction for security and give broad guidance.  Guidelines and instructions on security will be covered in more detailed supporting documents.

  1. Security staff

A security manager, with authority to act for the entire college, will be designated with responsibility for directing and coordinating the implementation of the college’s security policy.  This individual will report to the president so that allegiance is to the total rather than to any one department or business function.  Responsibilities of the security manager are to:

      1. Maintain a current up-to-date college-wide security policy
      2. Develop security awareness programs
      3. Publish detailed guidelines
      4. Assist department heads with implementation of the policy
      5. Coordinate security audits
      6. Recommend college operating unit security positions as required
    1. Information asset management
      1. All information will be accounted for and properly protected by a custodian program.
      2. The fundamental principle of custodial management deals with the identification of the individual who is responsible for a given information asset
      3. The individual administrator or department head or his/her agent who has management responsibilities of the asset is designated the custodian and is responsible for making recommendations to the security custodian with regard to:
        1. Who may use the asset
        2. The classification and level of protection given the asset
        3. Approving application controls and authorizing access to the asset
        4. Risk management, risk acceptance, and contingency planning with regard to the asset
    1. Management responsibility

All department heads and administrators must be intimately familiar with the college’s policies and guidelines and are responsible for ensuring that all employees are aware and abide by the established guidelines.

    1. Employee awareness
      1. All employees must be alert to the need for security.  This awareness must come from management’s communication of the college’s policy and guidelines to all personnel.  A clear understanding and commitment on the part of all employees to abide by the policy is necessary.
      2. A college-wide security awareness program will be the most cost effective action.  It will be a part of the new employee orientation program.  For existing employees, it will be instituted in a series of seminars and will be followed up with frequent reminders in college publications, on posters and in newsletters.
      3. There will be both scheduled and impromptu audits.  The program will:
        1. Emphasize the importance of security
        2. Identify security controls in terms of job and function for all employees
        3. Identify control practices to be followed
        4. Encourage participants to suggest improvements to the control practices
        5. Specify the consequences of non-compliance
      1. Security requirements and management’s expectations of the employee will be included as a part of each employee’s performance plan.  Job appraisals and performance reviews should provide feedback to the employee in measuring up to the protection of the college’s assets.

Hazards to information systems environment

    1. Hazards to the information system environment breaks down into two logical groupings:
      1. Natural hazards which include:  fire, wind, rain, rising water, lightning and others
      2. Manmade hazards which include:  errors, omissions, mischief, vandalism, arson, riot, war, fraud, embezzlement, theft, eavesdropping and others
    1. It has been found that accidental events account for the major exposure to data loss.  Intentional acts may have more serious consequences per event, but occur less frequently.


    1. For the purpose of risk analysis, the college will:
      1. Specify a list of potential hazards (both natural and manmade)
      2. Apply practical experience and management judgment to identifying the college’s vulnerabilities to these hazards
      3. Assess and project the frequency of occurrence(s)
      4. Quantify the resultant annualized loss exposure to the college on the basis of each type of hazard and expected frequency of occurrence
      5. Prioritize the results on the basis of loss exposure
      6. Identify protective measures to reduce the vulnerability to hazards or the resultant effect of hazardous events
      7. Select protection on the basis of cost benefit tradeoffs
      8. Implement protection on the basis of benefit to the college
      9. Periodically, monitor all occurrences of hazardous events and evaluate the effectiveness of protective measures employed for reducing the college’s vulnerability to loss

Protective measures

    1. Protective measures to reduce vulnerabilities and exposure to either accidental or intentional events are placed into three categories:
      1. Physical security. Physical security practices include:
        1. Providing a safe place to work
        2. Controlling access to sensitive resources
        3. Detecting and communicating emergencies
        4. Limiting the damage resulting from emergencies
      2. Contingency planning.  Contingency planning addresses three key areas:
        1. Emergency plans:  The goal of the emergency plan will be to contain the damage and preserve the mission of the college during a disaster.  It addresses such issues as early detection of the incident, safety of personnel, evacuation, shelter, and containment of the incident to a minimal effect.
        2. Backup plans:  The goal of the backup plan is to provide a capability to carry out critical portions of the college’s mission between the occurrence of an interruption and complete recovery.  It addresses such issues as user responsibility, assessment of the criticality of various functional areas of the college, identification of alternate sources to run critical college applications, and testing procedures.
        3. Recovery plans:  The goal of the recovery plan is to provide a permanent restoration of the college’s mission.  It addresses such issues as the information system manager’s responsibility, development of a strategy, resource identification, and testing procedures.
      1. The Contingency plan for each of these three areas will be completely documented and tested on a regular basis. 

History: Last Reviewed: 2/6/07

Adopted: 10/29/1986

Reviewed: 2/6/07

Revised: 12/4/01