Cybersecurity Standards
These are the IT security policies and standards that govern the University of Maryland, Baltimore County (UMBC). These guidelines are informed by a multi-tiered framework of legal, regulatory, and policy requirements set forth at the federal, state, University System of Maryland (USM), and university levels. UMBC translates these requirements into practical IT security controls – the technical and procedural measures employed to secure access to our data, systems, and networks. The core mission of these controls is to prevent the loss, exposure, or operational compromise of sensitive information and critical IT resources. By adhering to these standards and policies, UMBC ensures compliance with applicable regulations and effectively manages the ever-evolving landscape of information security risks.
Cybersecurity Policies
Data Use Guidelines
The most commonly used information has been pulled out below. Read the full Data Use Guidelines here. Guidance for Data Stewards and Principal Investigators is also available in the full Data Use Guidelines.
These guidelines are intended to:
- provide guidance to UMBC community members on how to safely and securely work with data that is classified higher than level 0, normally associated with public data;
- provide guidance to Data Stewards, including Principal Investigators, for guidance in selecting the appropriate data classification for data that is not level 0 and requires additional security controls.
These guidelines provide supporting information to properly implement the UMBC Policy on the Classification and Protection of Confidential Information.
Before UMBC employees can access student educational data protected by FERPA they are required to review FERPA requirements and attest they will abide by them. Also, all staff in departments considered high risk are required to complete UMBC’s self-paced security training, which is encouraged for all employees.
The Four Levels of Data Classification
Each of these four levels of classification has a set of security controls associated with protecting the information as required by policy or regulation. It is important for individuals to understand the classification system because this dictates what can be done with data.
- Level 0. Data explicitly or implicitly approved for distribution to the public where there is little institutional risk associated with this system due to security.
- Level 1. Data intended for internal University use and not approved for distribution to the public.
- Level 2. Protected data that if acquired could be used for identity theft.
- Level 3. Highest risk data, systems and applications or services that have externally mandated IT compliance requirements.
Data that is Level 0 can be emailed or manipulated on any computer, including your personal computer. On the other hand, Level 3, such as patient medical data, is never allowed to be emailed or manipulated outside of the guidance given by the departments that are responsible for this data.
Approved Risk Level By Storage Category or Device
As technology changes, there may be services or applications not listed below. Before posting or storing Sensitive Information in such locations, please contact DoIT by submitting an RT request or emailing security@umbc.edu.