Loyola University Chicago

Information Technology Services

About ITS

ITS Governance at Loyola is defined as a set of relationships and frameworks that provide input into process implementation, technology decisions and project work within Information Technology Services.x

ITS Internal

  • This provides information and links to the Change Management process and forms as well as the ITS Publication process and Vendor Questionnaire.

Job Opportunities

  • Find information about our current employment opportunities here.

Mission and Vision

Partnerships

  • Information about the shared partnerships with ResNet, Academic Learning Technologies the Information Commons and others. 

Policies & Guidelines

  • You can find our policies, guidelines, standards and best practices here.
  • View current ITS Projects, as well as a link to Project Central

Organizational Chart

 

Last Modified:   Tue, September 1, 2020 8:32 AM CDT

Scope:

This policy covers all computers and electronic devices capable of storing or transmitting electronic data that are owned or leased by Loyola University Chicago, consultants or agents of Loyola University Chicago and any parties who are contractually bound to handle data produced by Loyola.

Purpose:

The purpose of this policy is to ensure that Loyola Protected or Loyola Sensitive data is not inappropriately stored on Loyola computers and electronic devices through systematic electronic examination.

Policy:

Frequency

All departments will perform a Personal Information Security Compliance (PISC) Review at least every 6 months. Departments are free to perform PISC Reviews more frequently if they see a need to do so. All departments must maintain a schedule for performing their PISC Reviews.

Covered Systems

During a PISC Review, departments are responsible for scanning workstations, laptops, portable devices, and any servers that are managed by the department.  Portable devices that store electronic data should be attached to a computer during the PISC Review.  ITS will perform PISC Reviews for all servers that they manage.

Collection Method & Methodology

Scan results shall be stored on each machine that is scanned. The primary data steward or the alternate data steward in each department will be responsible for examining each scan result to determine if the machine or device houses Loyola Protected or Loyola Sensitive data.

Measurement & Reporting

The primary data steward or the alternate data steward in each department will create and send a summary of their scan results to ITS. This summary of scan results will include the number of computers and electronic devices that contain either Loyola Protected data or Loyola Sensitive data, and the number that contain neither.  Scan results will also include any machines which were believed to not contain Loyola Protected data or Loyola Sensitive data but were found to contain either data type.  ITS will create and provide a summary report to the Information Technology Executive Steering Committee.

Follow-up & Training

Any users who regularly use a computer or electronic device identified by a scan as inappropriately containing Loyola Protected data or Loyola Sensitive data without proper authorization may be required to complete online training on the use and storage of Loyola Protected data and Loyola Sensitive data.

Software

ITS will install software that is capable of scanning for Loyola Protected data and Loyola Sensitive data on all Loyola computers and electronic devices subject to this Policy.  Only software approved by ITS to scan for and identify Loyola Protected data and Loyola Sensitive data may be used during a PISC review.

Search Terms

The scanning software will search for the patterns that are specified in the Appendix.  If additional patterns are identified that need to be identified, they will be added to the Appendix.

Questions about this policy:

If you have questions about this policy, please contact the Information Security team at DataSecurity@luc.edu.

Policy adherence:

Failure to follow this policy can result in disciplinary action as provided in the Staff Handbook, Student Worker Employment Guide, and Faculty Handbook.  Disciplinary action for not following this policy may include termination, as provided in the applicable handbook or employment guide

Appendix:

Policies referenced

Definitions

Personal Information Security Compliance (PISC) Review – Occurs when a department follows the Personal Information Security Compliance Review Protocol.

Regular expression – A pattern, such as 9 consecutive digits or 3 consecutive digits then 2 consecutive characters.  Any item which matches the regular expression will be flagged by the scanning software.

Search Terms

The following regular expressions will be flagged by the scanning software as possible matches for sensitive data:

  • SSN9 – 9 consecutive digits
  • SSN324 – 3 consecutive digits, a dash, 2 consecutive digits, a dash, and 4 consecutive digits
  • AMEX – 4 consecutive digits, a dash, 6 consecutive digits, a dash, and 5 consecutive digits
  • VMCD – 4 consecutive digits, a dash, 4 consecutive digits, a dash, 4 consecutive digits, a dash, and 4 consecutive digits 

History:

  • March 4, 2008: Initial Policy
  • June 19, 2015: Annual Review for PCI Compliance
  • June 20, 2016: Annual Review for PCI Compliance
  • June 21, 2017: Annual Review for PCI Compliance
  • Sep 6, 2018: Annual Review for PCI Compliance
  • Sep 24, 2019: Annual Review for PCI Compliance
  • Aug 6, 2020: Annual Review for PCI Compliance

Scope:

This procedure applies to any electronic media which is required to be securely deleted because of the type of data it contains.

Purpose:

This procedure covers the process for securely deleting electronic media which either currently contains or previously contained information classified as Loyola Protected data or Loyola Sensitive data, which will be referred to as “covered data” in this procedure.

Procedure:

Hard drives

When a computer with a hard drive containing covered data is replaced, it initially will be stored in accordance with the existing equipment replacement policy.  When the hard drive would normally be placed back into circulation, it must first be securely deleted before this happens.

To securely delete a hard drive, an ITS technician will place the hard drive into a computer and boot a copy of an approved whole drive secure deletion tool, as listed in the appendix.  The ITS technician will then run the program, performing one complete overwrite.

USB drives

When a USB drive containing covered data needs to be discarded, an ITS technician will attach the USB drive to a computer and run an approved granular secure deletion tool, as listed in the appendix.  The ITS technician will then run the program, performing one complete overwrite.

Floppy diskettes, CD-Roms, DVD-Roms, and other similar media

When any form of media, which is inserted into a desktop drive, containing covered data needs to be discarded, the media must be physically destroyed.  This is most easily accomplished by using a pair of scissors to cut the media in half.  It is also acceptable to send the media through a shredding device.  This does not need to be performed by an ITS technician.

Backup tapes

When a backup tape needs to be discarded, the backup tape must be sent through a degaussing device.  Because it is difficult to determine which specific files are on which specific tape, all backup tapes are subject to this policy.  If an area has backup tapes but does not have a degaussing device, they can provide the backup tapes to ITS.  An ITS technician will then degauss the backup tapes.  Once the backup tapes are degaussed, they can be discarded.

Broken devices or media

If a device or piece of media is unable to be read, it must be either degaussed or physically destroyed.  If an area is unsure of how to do so, or does not have a degaussing device, they can contact ITS.  ITS will pick up the device or piece of media.  The ITS technician will then either physically destroy the device or degauss it, depending on which is more appropriate.

PCI Lockbox

PCI lockbox images older than 14 days will automatically be deleted from server storage daily. Results of this job will be logged to a central logging server in accordance with the Log Management Standard and emailed to appropriate ITS staff members.

PCI Servers and Network Devices

PCI servers and network devices that store Primary Account Number “PAN” information will have records containing the PAN older than 90 days will automatically be deleted from server storage daily.  Records containing the PAN on the ORACLE MICROS system, used by food services, will have records containing the PAN automatically deleted from the server older than 120 days deleted from server storage daily.

Devices containing HIPAA Related Information

Devices containing protected health information as outlined by HIPAA require additional steps to ensure no data can be retrieved from the device.  All HIPAA related devices will be erased using an approved whole drive secure deletion tool, as listed in the appendix.  The ITS technician will then run the program, performing seven complete overwrites. Any device that cannot be erased in this manner must be physically destroyed.

Appendix

Approved whole drive secure deletion tools

DBAN - https://sourceforge.net/projects/dban/ - 2.3 and above

Approved granular secure deletion Tools

Eraser - http://eraser.heidi.ie/download/ - 6.2 and above

History

  • March 12, 2008: V 1.0, Initial Procedure
  • October 8, 2014: V 1.1, Add PCI Lockbox procedure
  • June 19, 2015: V 1.1, Annual Review for PCI Compliance
  • April 13, 2016: V 1.1, Annual Review for PCI Compliance
  • May 18, 2017: V 1.1, Annual Review for PCI Compliance
  • July 20, 2017: V 1.2, Added secure deletion process for HIPAA information
  • June 12, 2018: V1.2 Annual Review for PCI Compliance
  • October 5, 2018: V1.3 Added procedure change for Micros
  • July 15, 2019: V1.3 Annual Review for PCI Compliance