{"id":1988,"date":"2023-12-20T09:12:43","date_gmt":"2023-12-20T09:12:43","guid":{"rendered":"http:\/\/10.50.124.17\/?page_id=1988"},"modified":"2024-01-01T14:29:01","modified_gmt":"2024-01-01T14:29:01","slug":"data-security-policy","status":"publish","type":"page","link":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/data-security-policy\/","title":{"rendered":"Data security policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1988\" class=\"elementor elementor-1988\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c0f450 e-flex e-con-boxed e-con e-parent\" data-id=\"8c0f450\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17f9a3c e-con-full e-flex e-con e-child\" data-id=\"17f9a3c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-451413b elementor-widget elementor-widget-text-editor\" data-id=\"451413b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Aamusted University Data Security Policies<\/h3><h5>Section 1: PURPOSE<\/h5><p>Data security is of paramount importance at Aamusted University, and these policies are established to safeguard sensitive information, uphold privacy, and maintain the integrity of the university&#8217;s data assets. Adherence to these policies is essential to mitigate risks associated with unauthorized access, disclosure, or loss of data.<\/p><h5>Section 2: DATA CLASSIFICATION<\/h5><h5>2.1 Sensitive Data:<\/h5><p>&#8211; Sensitive data, including personally identifiable information (PII), financial records, and research data, must be identified and classified.<\/p><h5>2.2 Data Ownership:<\/h5><p>&#8211; Clear ownership of data must be established, ensuring accountability for its protection.<\/p><h5>Section 3: ACCESS CONTROL<\/h5><h5>3.1 User Access:<\/h5><p>&#8211; Access to sensitive data is granted based on job responsibilities and the principle of least privilege.<br \/>&#8211; Regular access reviews are conducted to ensure appropriateness and relevance.<\/p><h5>3.2 Authentication:<\/h5><p>&#8211; Multi-factor authentication is required for access to sensitive systems and data repositories.<\/p><h5>Section 4: DATA TRANSMISSION AND STORAGE<\/h5><h5>4.1 Encryption:<\/h5><p>&#8211; Sensitive data transmitted over the network must be encrypted to prevent interception.<br \/>&#8211; Data at rest must be stored in encrypted formats.<\/p><h5>4.2 Secure File Transfer:<\/h5><p>&#8211; Secure methods, such as secure FTP or encrypted email, must be used for transferring sensitive data.<\/p><h5>Section 5: DATA RETENTION AND DISPOSAL<\/h5><h5>5.1 Data Lifecycle:<\/h5><p>&#8211; Define and adhere to data retention schedules based on legal, regulatory, and business requirements.<\/p><h5>5.2 Secure Disposal:<\/h5><p>&#8211; Implement secure methods for the disposal of data, including shredding physical documents and secure wiping of electronic storage.<\/p><h5>Section 6: INCIDENT RESPONSE AND REPORTING<\/h5><h5>6.1 Security Incidents:<\/h5><p>&#8211; Establish a protocol for reporting and responding to security incidents promptly.<\/p><h5>6.2 Breach Notification:<\/h5><p>&#8211; In the event of a data breach, a clear process for notifying affected parties, regulatory bodies, and relevant stakeholders is in place.<\/p><h5>Section 7: SECURITY AWARENESS AND TRAINING<\/h5><h5>7.1 Training Programs:<\/h5><p>&#8211; Regular security awareness training is mandatory for all staff and faculty members.<br \/>&#8211; Specialized training is provided to personnel handling sensitive data.<\/p><h5>Section 8: COMPLIANCE AND AUDITING<\/h5><h5>8.1 Regular Audits:<\/h5><p>&#8211; Conduct regular audits to assess compliance with data security policies.<br \/>&#8211; Address any identified vulnerabilities promptly.<\/p><h5>Section 9: POLICY REVIEW AND AMENDMENT<\/h5><h5>9.1 Review Cycle:<\/h5><p>&#8211; These policies will be periodically reviewed by the Office of Information Technology and CIO.<\/p><h5>9.2 Amendment Process:<\/h5><p>&#8211; Amendments to these policies will be proposed based on evolving security threats, technological changes, and legal or regulatory requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5d2a34 e-con-full e-flex e-con e-child\" data-id=\"f5d2a34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b8f157 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"0b8f157\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/itdirectorate.aamusted.edu.gh\/?page_id=1934\">Other Policies<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a71690 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7a71690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/itdirectorate.aamusted.edu.gh\/?page_id=937\">Explore our services<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Aamusted University Data Security Policies Section 1: PURPOSE Data security is of paramount importance at Aamusted University, and these policies are established to safeguard sensitive information, uphold privacy, and maintain the integrity of the university&#8217;s data assets. Adherence to these policies is essential to mitigate risks associated with unauthorized access, disclosure, or loss of data. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1988","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/1988"}],"collection":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/comments?post=1988"}],"version-history":[{"count":13,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/1988\/revisions"}],"predecessor-version":[{"id":2184,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/1988\/revisions\/2184"}],"wp:attachment":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/media?parent=1988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}