Cebu Normal University Information Technology Policies

Cebu Normal University has promulgated various policies related to its information technology resources applicable to all users of CNU’s information technology resources. The Information Technology Policies are to provide additional information regarding the use, application, amendment and the promulgation of additional technology policies.

CNU’s Information Technology Policies will be changed, amended, and added to as technology changes and develops. All persons or entities affected by any Information Technology policies are responsible for complying with the most recent version of each such policy and it is the responsibility of each such person or entity to be familiar with the Information Technology Policies.

Procedure for Development, Review and Modification of the Information Technology Policies

A. The Technical Working group for the crafting of ICT Policies will be a body comprised of the deans of each colleges and a representative of the Faculty Association Inc. (FAI) in addition to the ICTO-Head. The TWG will meet at the call of the ICTO-Head.

B. Proposals for new policies and/or modifications to existing policies will be forwarded to the ICTO-Head. The proposals and comments will be brought before the TWG Policy Review Subcommittee by the ICTO-Head.

C. New or amended policies will be approved by the President of the University and brought before the Board of Regents as an informational item. All new or amended policies will become effective upon Presidential approval and when posted on the Policy website.

Persons and entities outside CNU may have access to University data or engage in other acts which require them to be subject to CNU’s Information Technology Policies. It is the responsibility of the CNU department working with such outside person or entity to ensure that the person or entity is subject to CNU’s Information Technology Policies or similar terms and conditions which are at least as stringent. Any variation or exception requires approval of the Vice President for Administration (VPA), after consultation with the ICTO-Head, who oversees the department.

Other University policies may address use of the University’s information technology resources and topics similar to those addressed in the Information Technology Policies. In the event more than one policy addresses the same topic, users are responsible for observing the most stringent policy.

The Information Technology Policies are to be read as a consistent whole so as to effectuate their purpose. Any application for variation or exception from the provisions of CNU’s Information Technology Policies must be made by the Vice President for Administration in charge of the area seeking the exception/variation, after consultation with the ICTO-Head.

Penalty provisions are included in each Information Technology policy. In addition to the statements in each policy, penalties may be imposed as provided in Section V of the Information Technology Acceptable Use policy. Violations of CNU’s Information Technology Policies may result in disciplinary action up to and including suspension of access to technology resources, termination of employment, or submitting student violations to the Vice President for Academic Affairs. A violation of any of CNU’s Information Technology Policies by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with Cebu Normal University.

Signatures on an account application form, acceptance of a user ID, online registration, or use of any information technology resource denotes that the applicant/user has read and understands and consents to CNU’s Information Technology Policies.




Acceptable Use Policy

Section I: Access to Information Technology Facilities

A. Governing Principles
1. In support of its essential mission to enhance educational, economic and cultural opportunities for the people of Cebu Province, Cebu Normal University offers information technology resources to its students, faculty and staff. These resources contribute to the work of all members of the University community. They advance the scholarly pursuit of knowledge and those administrative functions necessary for the operation of the University.

2. Users of the University's information technology facilities are required to comply with and be subject to the CNU Information Technology Acceptable Use policy, university policies, user access request form, a list of which can be obtained from the office of the ICTO. The University reserves the right to amend this document at any time without prior notice.

3. All information technology users are expected to demonstrate respect for the rights of other users and to promote equitable use by all, enabling necessary access to all.

4. User access to information technology resources is contingent upon prudent and responsible use.

B. Authorization and Equity of Access
University information technology resources are provided to faculty, staff, and students for the purposes of study, research, service and other academic and university related activities. Access to information technology resources is granted to an individual by CNU for that individual's sole use in furthering the University’s mission and purpose. Information technology resources must be shared among users in an equitable manner. The user may not participate in any behavior that unreasonably interferes with the equitable use of information technology resources by another.

C. Acknowledgement of Receipt Authorization
Signature on an account application form, acceptance of a user ID, or online registration denotes that the applicant has read and understands the guidelines available and also denotes acceptance of this Acceptable Use document.
D. Priority for Access and Resource Allocation
The priority guiding information technology access and resource allocation is teaching and learning. Service, research and administrative priorities will be determined as they support teaching and learning.



Section II: Security of University Information Technology Resources

A. Protection of Information Technology Resources and Institutional Data
1. To protect the integrity of the University's information technology facilities and the users thereof against unauthorized or improper use of those facilities, CNU reserves the right, without notice, to temporarily limit or restrict any individual's use and to inspect, copy, remove, or otherwise alter any data, file, or system resource which may undermine the authorized use of any information technology facility.

B. Investigation and Review of Policy Infractions
1. University sanctions are imposed by the appropriate university authority and may include, but are not limited to, limitation or revocation of access rights and/or reimbursement to the university for all costs incurred in detecting and proving the violation of these rules, as well as from the violation itself.

2. Users must use only those information technology resources which the University has authorized for their individual use. The unauthorized use of information technology resources or providing false or misleading information for the purpose of obtaining access to information technology facilities is prohibited and may be regarded as a criminal act and will be treated accordingly. Users may not use university information technology facilities to gain unauthorized access to other institutions, organizations, or individuals.

3. Failure to comply with one or more of the specific requirements of this policy may jeopardize access to or use of CNUfacilities and services and could result in a review and investigation into the identified violation.

4. Supervisors of systems and facilities have the authority to immediately terminate any program or access that is suspected to be inappropriate or detrimental to operations.

C. Control and Licensing of Software
1. All users are expected to comply with all intellectual property laws including copyright law.

2. Users may not copy, distribute, display, or disclose third party proprietary software without prior authorization from the licenser. Proprietary software may not be installed on systems not properly licensed for its use. The University does not condone or authorize the copying or possession of illegal software. University students and employees are prohibited from copying software illegally and possessing illegal copies of software, whether for course-related, job-related, or private use. Any violations of this policy is the personal responsibility of the user. The University assumes no liability for such acts.

3. Any user who suspects or has knowledge of copyright or intellectual property law violations must immediately report this activity to the University Intellectual Property Rights Office (IPRO). Failure to report such activity will be considered a violation of the Information Technology Acceptable Use Policy.

D. Individual Privacy
1. Users are authorized to access, use, copy, modify, delete or grant others access to their personal files or data, as specified in this policy. However, users are not authorized to perform any of these functions on another user's account or a university system unless specifically authorized by the account holder, job description, the ICTO-Head or designee, or the appropriate system administrator.

2. Users may not monitor another user's data communications.

3. User privacy is not to be violated. However, user privacy is subject to all university policies. As such, authorized individuals may access and disseminate private information in performance of their official job duties. Unauthorized personal use of a user’s private information is prohibited .

4. Failure to protect the privacy of others by intentionally or unintentionally permitting access to systems or data is unacceptable. Violations of this requirement include, but are not limited to:

a. Leaving confidential or protected information on a screen where it could be viewed by unauthorized individuals
b. Giving a personal password to someone else
c. Leaving a personal password where it can easily be found
d. Allowing someone to use a system signed on under a personal password
e. Knowingly failing to report a personal password that has been used by another person, with or without permission
f. Leaving a system signed on and accessible while unattended

E. Confidentiality
1. The unauthorized release of any personal or confidential information may violate state and federal law and will not be tolerated. Failure to protect confidential information is unacceptable.
a. Users are responsible for their information technology accounts; they should maintain secure passwords and take precautions against unauthorized access to their information technology resources. Users may be charged with a violation if someone uses their accounts inappropriately.

F. General Security
1. General security infractions include, but are not limited to:
a. Using information technology resources for unauthorized remote activities
b. Deliberately causing system failure, disruption, or compromising system security
c. Intentionally obscuring, changing, or forging of the date, time, physical source, logical source, or other label or header information on data or electronic communications
d. Unauthorized interception of electronically transmitted information without prior written authorization from the ICTO-Head or designee
e. Performing an act which will adversely impact the operation of computers, terminals, peripherals, or networks. This includes, but is not limited to, tampering with components of a local area network (LAN) or the high-speed backbone network, otherwise blocking communication lines, or interfering with the operational readiness of a computer


Section III: Copyright and the Use of CNU’s Information Technology Resources


A. General Copyright Principles
1. The nature and purpose of copyright in general.

a. Copyright protections are intended to promote progress in science and the arts and to stimulate the production and publication of enlightening and creative matter.
b. Books, periodicals, musical works, motion pictures, sound recordings, computer programs, and photographs are examples of materials or works which may be protected by copyright.
c. The rights afforded to the holder of a copyright include the exclusive rights to copy and distribute the work to which the copyright applies.
d. It is not the purpose of this policy to discuss copyright principles in detail. Helpful information regarding Copyright Law is available on-line from the Intellectual Property Office of the Philippines whose address is https://www.ipophil.gov.ph/copyright/. That site contains relevant materials such as “Copyright Basics” and “Frequently Asked Questions” as well as links to various publications which cover a wide array of topics.

2. Infringement

a. An act which violates any right of the holder of a copyright is an infringing act and is illegal.

i. Section II of this Acceptable Use Policy specifically discusses the “Control and Licensing of Software.”
ii. As described below under Section III (C), violation of copyright may carry civil and criminal penalties.

b. Securing the permission of the copyright owner to make use of a work is an effective method for addressing a copyright issue.

3. Limitations on copyright protections.

a. Copyright protections are not absolute and there are exceptions to the rights afforded by copyright.
b. The “fair use” doctrine is one such exception.

i. The “fair use” doctrine recognizes instances in which use of a copyrighted work in connection with certain activities is considered “fair” and not infringing although such behavior could be infringing in other contexts.
ii. Application of the “fair use” exception entails a fact intensive inquiry and the consideration of various factors.

a. It cannot be assumed the “fair use” exception automatically applies to a particular situation or that all rights afforded by copyright give way merely because a use occurs, for example, within the context of the classroom.
b. The Intellectual Property Office of the Philippines has stated, “Copyright need not be registered to be protected. The legal protection is given the moment a work is created.”

B. Application of Copyright Principles to Users of CNU’s Information Technology Resources
1. Copyright principles apply to materials posted to and downloaded from the internet.

a. As stated in the “Frequently Asked Questions” found on the website of the Intellectual Property Office of the Philippines, “Uploading or downloading works protected by copyright without the authority of the copyright owner is an infringement of the copyright owner's exclusive rights of reproduction and/or distribution. Since any original work of authorship fixed in a tangible medium (including a computer file) is protected by federal copyright law upon creation, in the absence of clear information to the contrary, most works may be assumed to be protected by federal copyright law.”
b. Users of CNU’s Intellectual Property Rights Office must be aware that potential copyright issues exist with respect to materials copied from or posted to the internet.
c. If posting or downloading information to or from the internet, the CNU website or any webpage, or any other site is required as part of a regular university function or activity, those involved are responsible for ensuring copyright is not violated.
2. Copyright compliance by users of CNU’s information technology resources

a. CNU’s Information Technology Resources must be used in accordance with copyright law. The following policy statements do not limit the breadth of the preceding statement.

i. It is a violation of this Acceptable Use Policy to use CNU’s information technology resources to place materials protected by copyright on the internet or any other site in violation of the rights of the holder of the copyright.
ii. It is a violation of this Acceptable Use Policy to use any information technology resources to place materials protected by copyright on any CNU webpage or website in violation of the rights of the holder of the copyright.
iii. It is a violation of this Acceptable Use Policy to use CNU’s Information Technology Resources to download or distribute copyrighted materials in violation of the rights of the holder of the copyright.
iv. Peer-to-peer (p2p) file sharing often involves works which are protected by copyright. It is a violation of this Acceptable Use Policy for users of CNU’s Information Technology Resources to download protected music or movies in violation of the rights of the holder of the copyright.
v. Distribution of copyrighted material in violation of the rights of the holder of any copyright interest, including unauthorized p2p file sharing, may lead to civil and criminal penalties.
vi. Users of CNU’s Information Technology Resources, like the users of other resources, are responsible for determining whether their use of the information technology resources violates copyright and whether materials posted to or copied from the internet or CNU’s website or any CNU webpage are protected by copyright and for complying with the copyright applicable to the work.

a. It has been held that the rationale “try before you buy” is not a “fair use” which prevents the unauthorized downloading of music from being infringing.
b. The unauthorized downloading of only a “few” songs is no defense to a claim of copyright infringement.
b. Actions by CNU to foster copyright compliance by users of its Information Technology Resources

i. Notice to CNU of materials on its website which violate copyright
a. In accordance with law, CNU will expeditiously remove or disable access to infringing material if it has actual knowledge that material is infringing or receives notice from the owner, or the authorized agent of the owner, of the copyright interest allegedly infringed.
b. The notice from the owner, or authorized agent of the owner, of a copyright interest referred to in paragraph B.2.b.i.a. must contain the following:

i. A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
ii. Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
iii. Identification of the material, or a reference or link to the material or activity, that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit CNU to locate the material or reference or link.
iv. Information reasonably sufficient to permit CNU to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
v. A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
vi. A statement that the information in the notification is accurate, and under penalty of perjury, and that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

ii. CNU has designated the Intellectual Property Rights Office (IPRO), as its agent for receipt of notices of claimed infringement. The office may be contacted at Cebu Normal University, Osmeña Boulevard, Cebu City. Their telephone number is 2541452, and their e-mail address is ipro@cnu.edu.ph.
iii. CNU’s program to combat the unauthorized downloading and/or distribution of copyrighted material by users of CNU’s Information Technology Resources
i. Technological Resources
i. CNU uses technological resources to identify potential p2p traffic. These resources do not unduly interfere with the educational and research use of the CNU network.
ii. CNU accommodates and does not interfere with standard technical measures that are used by copyright owners to identify or protect copyrighted works.
ii. Educational methods
i. CNU will educate the users of its information technology resources of the importance of complying with copyright in connection with the use of its information technology resources.
ii. Students have been warned, and students will continue to be warned, against the unauthorized uploading, downloading, and distribution of copyrighted material including p2p file sharing.
iii. Alternatives to downloading
i. The Intellectual Property Rights Office will periodically review legal alternatives for downloading or otherwise acquiring copyrighted material.
ii. If such alternatives are identified, the results will be provided to the campus community.
iii. If deemed practicable by CNU, alternatives for downloading or otherwise acquiring copyrighted material may be made available.

C. Penalties for Violation of CNU policy regarding copyright and Information Technology Resources
1. Penalties under the law for copyright infringement.

a. Users may be sued for their infringing activities. Acts can be infringing and result in civil penalties even though there is no intent to violate a copyright. Under certain circumstances, the infringer may be responsible for the other party's attorney's fees. Statutory civil damages can be as high as P150,000 for each work infringed if a violation is committed willfully.
b. Willful copyright infringement can also be a crime. Even a first time offense can carry a prison term of from 1 to 5 years plus fines depending upon the facts and circumstances.

2. Institutional penalties.

a. Procedures are discussed above with respect to notifying CNU of the presence of infringing materials on its website.

b. The procedure for handling complaints against any individual suspected of violating this policy regarding copyright and the use of CNU’s Information Technology Resources is described in Section V.

c. Users of CNU Information Technology Resources who engage in activity contrary to this copyright policy, including unauthorized p2p file sharing, will be disciplined.

d. Complaints against students should be referred to the Vice President for Academic Affairs.

i. Such referral may result in proceedings before the University’s Ethics Review Board.
ii. Sanctions which may be imposed against any student violating this policy include, depending upon the circumstances, referral to alternative services, warning, loss of privileges, probation, restitution, a program of self-improvement and education, recommendation of suspension, and recommendation of expulsion.

e. Complaints against faculty and staff who violate this policy will be handled in accordance with established university policy or practice.

i. Penalties assessed against faculty and staff who violate this policy may include written warning, loss of privileges, suspension of employment, and termination of employment depending upon the circumstances.
ii. Complaints against employee’s subject to receipt of employee disciplinary reports will be handled in accordance with provisions of the Personnel Policies and Procedures Manual regarding employee discipline. The severity of the violation will be taken into account in assessing any penalty.
iii. Established grievance procedures will be utilized to review any penalty imposed.
iv. Temporary or permanent loss of access to CNU’s information technology resources may occur with a first violation of this policy. In appropriate circumstances, repeat offenders will permanently lose access.

f. In the event CNU becomes aware of a user’s alleged violation of this policy, it may take advantage of the provisions regarding “Protection of Information Technology Resources and Institutional Data” and “Investigation and Review of Policy Infractions” found in Section II above.
g. As provided under Section II, under “Control and Licensing of Software,” any user who suspects or has knowledge of copyright violations must immediately report this activity to the University’s Intellectual Property Rights Office (IPRO), whose contact information is found above in Section B.2.b.ii. Failure to report such activity will be considered a violation of the Information Technology Acceptable Use Policy.

D. Periodic Policy Review
1. This policy related to copyright and the use of CNU’s Information Technology Resources will be reviewed periodically in order to assure that it addresses the changing needs and concerns of Cebu Normal University and to remain compliant with law.

2. The Information Technology Advisory Committee will perform the periodic review stated in the preceding paragraph by applying assessment criteria it deems relevant.

a. It is authorized to revise and/or implement new policies under this Section III upon approval of the President of the University.
b. The authorization under this Section includes implementing revised or additional procedures related to, or penalties for, alleged violations of this policy. All such additions and/or revisions must be approved by the President of the University.


Section IV: Ethical Practices


A. Expectations
1. All users are expected to conduct themselves in a legal, professional, fair, considerate, and ethical manner. Each individual should use equipment safely, responsibly and only for its intended function. Users should keep all equipment clean and in good operating condition.

B. Protection and Maintenance of Equipment

1. Protection and maintenance of equipment includes, but are not limited to:

a. Having only authorized staff perform installations
b. Plugging all equipment into an Underwriter's Laboratory approved surge protector or uninterruptible power supply
c. Locating equipment according to manufacturer’s specifications. Equipment should be protected from extreme heat or cold, excessive humidity, smoke, dust, overloaded circuits, stressed or worn cords, or any other potentially damaging situation
d. Keeping food and beverages away from equipment
e. Scheduling routine maintenance

2. Equipment, software, tools, supplies, etc., are not to be removed from their assigned locations without authorization from the administrator responsible for those items.

3. Repair or replacement of any item damaged when used for purposes other than those related to university functions or when used without authorization will be at the user's expense. Unpaid debts incurred in this manner will be handled in accordance with the usual Accounting and Financial Services procedures.

C. Harassing, Offensive, Profane, and Abusive Material

1. University information technology resources may not be used in a harassing, offensive, profane, or abusive manner. The perception or reaction of affected persons is a major factor in determining if a specific action is in violation of this policy.

D. Commercial Use

1. University information technology resources may not be used for personal or commercial profit. Individuals may not use information technology resources for any commercial purpose without prior written authorization from the ICTO-Head, or designee.


Section V: Violations


A. Procedure for Reporting Violations

1. Violations should be reported to the faculty/immediate supervisor of the individual, the ICTO-Head, or the administrator responsible for the system that was breached or misused. The notified party will inform the appropriate university official. Violations may result in one or more of the following actions:

a. Verbal or written warning with reference to appropriate policy
b. Suspend access either temporarily or permanently
c. File a formal Employee Disciplinary Report (EDR), if the individual is an employee
d. Formally submit student infractions to the Vice President for Student Affairs
e. Consult with the University Attorney and/or Public Safety, who may file civil or criminal charges.
f. Refer complaints of harassment or discrimination to the Office of Equal Opportunity
g. For any individuals outside of the immediate university community, send a written notice of the infraction to the employer, principal, or entity that initiated access for that person

B. Procedure for Appeal
1. Appeals may be filed using existing procedures for staff, faculty, and students. All other appeals will go to the Vice President for Administrative Services for disposition.


Section VI: Administration of Policy

A. Procedure for Development, Review and Modification of this Policy

1. The Policy Review Subcommittee of the Information Technology Advisory Committee will be a body comprised of at least four members of the larger committee in addition to the ICTO-Head. The Policy Review Subcommittee will meet at the call of the ICTO-Head.

2. Proposals for new policies and/or modifications to existing policies will be forwarded to the ICTO-Head. The proposals and comments will be brought before the ITAC Policy Review Subcommittee by the ICTO-Head.

B. Communication of Policy
1. Signature on an account application form, acceptance of a user ID, or online registration denotes that the applicant has read and understands the guidelines available and also denotes acceptance of the Information Technology Acceptable Use Policy.

2. The policy is available online at http://campus.murraystate.edu/aup/ and in print form in Waterfield Library.

C. Other Information Technology Policies
1. Departments with their own information technology labs will adhere to the same general operating guidelines as established by this policy. Glossary of Terms

Technical Terms used in the Technology Policy · Access Rights Permission to use an CNU information technology resource according to appropriate limitations, controls, and guidelines.
· Commercial purpose A goal or end involving the buying and/or selling of goods or services for the purpose of making a profit.
· Data A representation of facts, concepts, or instructions suitable for communication, interpretation, or processing by human or automatic means.
· Disk Space Allocation the amount of disk storage space assigned to a particular user by University Information Systems or the appropriate system administrator.
· Equitable Use Use of information technology resources in accordance with this policy, within the rules of an individual CNU facility, and so as not to unreasonably interfere with the use of the same resources by others.
· File A collection of data treated as a unit.
· Inappropriate use of authority or special privilege Use of one's access right(s) or position in a manner that violates the rules of use of those privileges as specified by the ICTO-Head, or designee, or the appropriate system administrator.
· Information Technology Resource Any information technology/network equipment, facility or service made available to users by Cebu Normal University.
· Password A string of characters that a user must supply to meet security requirements before gaining access to a particular information technology resource.
· Prudent and Responsible Use Use of information technology resources in a manner that promotes the efficient use and security of one's own access right(s), the access rights of other users, and CNU information technology resources.
· Remote Activity Any information technology action or behavior that accesses remote site facilities via an CNU information technology resource.
· Remote Site Any information technology/network equipment, facility, or service not part of, but connected with, CNU information technology resources via a communications network.
· System Administrator Any individual authorized by the ICTO-Head, the Provost/Vice President, or a designee to administer a particular information technology hardware system and/or its system software.
· Transmission The transfer of a signal, message, or other form of information from one location to another.
· Unauthorized Act With the exception of information technology actions or behaviors permitted in this policy, any act performed without the explicit permission of the ICTO-Head, or designee, or the appropriate system administrator.
· Usage Record Information or data indicating the level of usage of information technology resources by a particular user.
· User Any individual -- whether student, staff, or individual external to CNU -- who uses CNU information technology resources.
· User ID A character string that uniquely identifies a particular user of CNU information technology resources.





Privacy Policy

1.0 Purpose

application. Members of the public, too, may visit and search CNU web pages and utilize tools which appear there. The University also provides network and internet access thru the Campus and ResNet networks to members of the campus community. Of course, CNU also provides numerous computers for use with work and study as well as the basic infrastructure and architecture which enables the system to operate.

All of these resources enable users to communicate with each other, the University, and others off campus; to transact various matters of business; and to gain access to a vast amount of data with greatly increased ease and efficiency.

CNU has established this policy so that users are aware of the privacy which surrounds their use of technology resources and the information and communications they send and which are received by, and which are stored in, such means.

If you have any questions or concerns about this policy or your information, please contact Information Systems at 2541452 local 0.




2.0 Scope

This policy applies to all users of university information technology resources, which is defined as all information technology/network equipment, facilities, and services made available to users by Cebu Normal University, and the data stored thereon. The term information technology resources encompass all university owned and operated computers, software, hardware, and infrastructure. It further includes all university services and programs such as email, online payment, and CNU web pages. It also includes:

1. Data and other files, including electronic mail, stored in or located or residing on (temporarily or otherwise) university-owned centrally-maintained systems, departmentally-maintained systems, and university-owned systems or computers.
2. University data and other files stored off campus in systems owned or operated by other entities. These systems may be subject to their own terms and conditions related to privacy and other matters.
3. Data communicated over Campus networks.
4. Telecommunications (voice or data) traffic from, to, or between any devices described above including voicemail. As used in this Information Technology Privacy Policy, “you” and “user” both refer to any individual -- whether student, faculty, staff, or individual external to CNU -- who uses CNU information technology resources.




3.0 Policy


3.1 What Information is Available from CNU’s Technology Resources

Information You Knowingly Provide

You may communicate via CNU’s information technology resources for many reasons. You may send an email to the Registrar’s Office, Human Resources, a work colleague, or a friend; forward a draft document to a co-worker; submit a class assignment to a professor electronically; or apply for admission to the University via an online form. Thus, depending upon the nature of any communication the information transmitted and available through information technology resources could include personally identifiable information such as name, telephone numbers, date of birth, permanent addresses, social security number, employment or class information, etc. Information requested by CNU in forms or applications is needed so CNU can provide the service you need or request.

3.1.2 Information You May Not Realize You Provide



In addition to the kinds of information referenced above, information may be transmitted and recorded (whether you realize it or not) anytime you use CNU’s technology resources including simply visiting a Cebu Normal University web site. This information includes but is not limited to:

  • Internet address of the computer being used
  • The web pages requested or viewed
  • The web page which referred the user to any CNU web page
  • The internet browser used
  • The date, time, and duration of the activity
  • The accounts accessed
  • The accounts accessed
  • The volume of data stored and transferred

3.1.3 Documents and files



You may use CNU’s information technology resources to create files, documents, or other compilations of data or information. These items may not be sent to anyone, but may simply be created on a CNU computer at a work station or in a computer laboratory and could remain there without you intentionally saving them on the computer.

CNU’s information resources are used to create, store, and manage files or documents about employees, students, alumni, contractors, and others. These documents can contain personally identifiable information including name, address, date of birth, social security number, gender, race, grades, and other personal information, as well as financial information such as salary, banking information, and payroll deductions. Such information and the compilation of such information are necessary in order to carry on the regular operations of an institution of higher education.

3.1.4 Cookies



Cookies are a technology which can be used to provide you with tailored information from a web site. A cookie is an element of data that a web site can send to your browser, which may then store it on your system. It can then be read back later by the web site when required. The use of cookies is a convenient way of allowing a computer to remember specific information relating to a web site. You can set your browser to notify you when you receive a cookie, giving you the chance to decide whether to accept it.

CNU’s systems make use of cookies for the following purposes:

  • Site administration
  • Completing the user's current activity
  • User Targeting

3.1.5 Information from On-Line Payments



It is possible to make on-line payments at CNU with debit and credit cards and e-checks. In some instances, the user making the payment is directed to a third party website in order to make payment. The third party sites may have their own privacy policies. In other instances, on-line payments result in the storage of information on CNU servers.

3.1.6 E-Mail



Emails sent or received using CNU’s information technology resources or sent from or to any email address provided by CNU are subject to monitoring and access by CNU.

CNU may utilize an outside e-mail/service provider. In the event CNU utilizes an outside e-mail/service provider, CNU will maintain on its own servers copies of all e-mail sent or received through that e-mail/service provider; this email will be subject to this Information Technology Privacy Policy. The e-mail/service provider will also monitor and have access to the accounts which it provides. CNU will also have access to emails and other documents/transmissions in those accounts maintained by the provider. The provider will have its own privacy policies.

3.2 Who Has Access to Information Available From CNU’s Information Technology Resources?



3.2.1 CNU Employees

1.To provide services
  • As noted above, information technology resources are used to communicate with the University and its staff and faculty for many different reasons. Requests for services and information from and submissions to the University are reviewed by the appropriate CNU employee. Depending upon the nature of the user’s transmittal, the communication may be reviewed by more than one employee in order to provide the needed service. These employees will only use this data for work related purposes, which may include sharing it with appropriate individuals outside CNU, and as otherwise allowed here.
  • In the course of their normal job duties and the operation of the University, authorized employees will have access to data, including stored data, about you. This data may not have been communicated directly to those employees by you, but appropriate employees will have access as a regular part of their employment. They will only use this data for work related purposes, which may include sharing it with appropriate individuals outside CNU, and as otherwise allowed here.

2.Monitoring and Access
  • CNU, as a regular part of its business, monitors its information technology resources in an effort to ensure they are used in accordance with law and university policy, that they are operating efficiently, that there are no threats to them, and that they are regularly maintained and up-dated. This regular monitoring may result in CNU’s accessing information technology resources you use including email and communications you send or receive, viewing or scanning files or software you have placed on CNU’s information technology resources, and retrieving, copying, and distributing information found. Appropriate action will be taken if this regular monitoring reveals violations of law or any university policy.
  • CNU may as a regular part of its business also monitor and access the information technology resources you use. This includes email and communications you send or receive or files or software you have placed on CNU’s information technology resources. CNU may retrieve, copy, and distribute information found if such actions are taken by an employee as a regular and necessary part of his/her job duties, or if such actions are determined to be in the best interests of CNU by the ICTO-Head or higher level of university management. This may occur, for example, in the event there are reasonable grounds to believe:
  • There is a threat to the University’s information technology resources, or if such access is needed to ensure the efficient operations of any CNU information technology resources
  • That a violation of university policy or an illegal act has occurred or may occur
  • There is a threat to university property or the rights of the University
  • There is an emergency affecting the safety of persons or property
  • Access is needed in order for CNU to conduct its regular business affairs efficiently
  • Litigation involving the University or its agents or employees is possible or on-going.
  • A work document, to which a department needs access, is on an employee’s computer but the employee is absent.
  • CNU’s monitoring and access may occur without notice to you. The fact that any information technology resource is password protected will not prevent monitoring and access by CNU. Monitoring and access may include physically accessing information resources wherever located.


3.2.2 Disclosure of information to individuals outside of CNU

1. CNU may initiate disclosure of information from its information technology resources to persons or entities inside or outside the University if needed in order for CNU to carry on its activities as an institution of higher education or if otherwise consistent with law. CNU employees may need to share information with other agencies in order to implement programs provided at CNU or to assist with a particular request. CNU will advise law enforcement officials, if the regular monitoring of its information technology resources uncovers activity which may be criminal in nature such as downloading child pornography or communications of an illegal nature.
2. Requests for information from persons or entities outside the University. The following considerations are relevant in the event CNU receives a request from a person or entity outside the University for information, including personally identifiable information, available from its information technology resources.
  • Freedom of Information Act
  • Because CNU is a public agency, it is subject to the provisions of the Freedom of Information Act. These statutes require the release of certain records the University maintains, including electronic records, if a proper request is made.
  • Not all records, however, are subject to release. The FOI act exempts from disclosure, for example, information of a “personal nature” contained in a record maintained by the University. Thus, CNU does not provide an employee’s social security number or bank account information even if a proper open records request regarding the employee is made.
  • Employee users of CNU’s email system are advised that their private and business email communications may be subject to the FOI Act.
  • Other considerations
  • Release of information found within CNU’s information technology resources may be required if it is the subject of legal process, such as a subpoena, or is requested by an agency with proper jurisdiction.
  • CNU may be required to produce information stored within its information technology resources in the event of litigation. In addition, CNU reserves the right to collect and release any information regarding or created by any user in the event CNU and the user are involved in litigation including any administrative or internal proceedings.


4.0 Review and Modification


1. Proposals for amendments to this policy will be forwarded to the ICTO-Head. The proposals and comments will be brought before the Technical Working Group for by the ICTO-Head.

2. Any amendments to this policy will be approved by the President of the University. All new or amended policies will become effective as soon as Presidential approval is obtained and they have been published on the Policy website.

5.0 Penalty


Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

6.0 Acceptance/Consent


Signature on an account application form, acceptance of a user ID, online registration, or use of any information technology resource denotes that the applicant/user has read and understands, accepts and consents to this Information Technology Privacy Policy.




Acceptable Encryption

1.0 Purpose

The purpose of this policy is to provide guidance that limits the use of encryption technologies to those algorithms that have received substantial public review and have been proven to work effectively. Any questions or comments about this policy should be directed to Information Systems.

2.0 Scope

This policy applies to all Cebu Normal University data, regardless of where it is stored.

3.0 Policy

This policy is to be used as a guideline for encryption methods for Cebu Normal University data. Cebu Normal University requires that certain sensitive data, as provided in the Information Sensitivity Policy, must be encrypted according to the Acceptable Encryption Standard. The use of proprietary encryption algorithms is not allowed for any purpose unless reviewed by qualified experts outside of the vendor in question and approved by the Data Protection Officer. Users of CNU’s information technology resources who may be involved in the development, transfer, or sharing of any encryption technology are advised that these activities may be controlled by federal law. Users involved in any such activities should contact Information Systems which will assist in providing additional information.

4.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including the termination of their contract or assignment with Cebu Normal University.

5.0 Definitions

Encryption

Encryption is a procedure used to convert data from its original form to a format that is unreadable and/or unusable to anyone without the tools/information needed to reverse the encryption process.




Anti-Virus Software Policy

1.0 Purpose

The purpose of this policy is to provide guidance designed to limit virus-related issues for Cebu Normal University. Any questions or comments about this policy should be directed to Information Systems

2.0 Scope

This policy applies to all machines connected to the Cebu Normal University networks.

3.0 Policy

Always run Information Systems approved anti-virus/anti-spyware software. This should also be kept updated with the latest virus definitions. All machines should also follow the Anti-Virus Standards which further state Murray State's stance on anti-virus software and proper use

4.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Cebu Normal University.

5.0 Definitions

Cebu Normal University Network

Being connected to a Cebu Normal University network includes the following:
  • If you have a network capable device (ex. laptop) plugged into a Cebu Normal University owned building, then you are connected to the CNU LAN (local area network).
  • If you have a wireless capable device (ex. laptop, iPhone) and connect to CNUWireless or CNUSecure, then you are connected to the CNU WLAN (wireless local area network).
  • If you connect from a computer through the Cebu Normal University VPN (virtual private network), you are then connected to the CNU LAN (local area network).




Audit Policy

1.0 Purpose

The purpose of this policy is to advise users of security scanning procedures and precautions used by Cebu Normal University to audit their network and systems. Other persons or entities, unless authorized, are prohibited from performing any such audits.
Audits may be conducted to:
  • Ensure integrity, confidentiality, and availability of information and resources
  • Investigate possible security incidents to ensure conformance to CNU Information Technology policies
  • Monitor user or system activity where appropriat


Any questions or comments about this policy should be directed to Information Systems.

2.0 Scope

This policy covers all computer and communication devices owned or operated by Cebu Normal University, any computer or communication device connected to the CNU network, any computer or communication device which has been connected to the CNU network if it is believed such computer or communication device has been used contrary to any CNU Information Technology policy while so connected, and all computers and communication devices that are attempting in any manner to interact or interface with the CNU network.

3.0 Policy

Cebu Normal University shall utilize auditing software to perform electronic scans of their networks, servers, switches/routers, firewalls, and/or any other systems at Cebu Normal University. This also includes scans of any electronic communication and e-mails regardless of by or to whom the communications are sent.
These tests may include:
  • User and/or system level access to any computing or communications device
  • Access to information that may be produced, transmitted or stored on Cebu Normal University equipment or premises
  • Access to work areas (labs, offices, cubicles, storage areas, etc.)
  • Access to interactively monitor and log traffic on Cebu Normal University networks
  • Penetration testing
  • Password Auditing
  • Scanning for Personally Identifiable Information

3.1 Network Control

Internal security testing on all Cebu Normal University owned networks requires the prior approval of the ICTO-Head. This includes all computers and equipment that are connected to the network at the time of the test.

4.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with Cebu Normal University.

5.0 Definitions

Cebu Normal University Network

Being connected to a Cebu Normal University network includes the following:
  • If you have a network capable device (ex. laptop) plugged into a Cebu Normal University owned building, then you are connected to the CNU LAN (local area network).
  • If you have a wireless capable device (ex. laptop, iPhone) and connect to CNUWireless or CNUSecure, then you are connected to the CNU WLAN (wireless local area network).
  • If you connect from a computer through the Cebu Normal University VPN (virtual private network), you are then connected to the CNU LAN (local area network).




Data Sanitation Policy

1.0 Purpose

The purpose of this policy is to provide a guideline for the procedure by which data may be permanently removed from any computer, server, removable media, CD/DVD, etc in such a way that the data is deliberately made non-recoverable. Employees must consult the University's Record Retention Policy prior to deleting any data. Any questions or comments about this policy should be directed to Information Systems.
Audits may be conducted to:
  • Ensure integrity, confidentiality, and availability of information and resources
  • Investigate possible security incidents to ensure conformance to CNU Information Technology policies
  • Monitor user or system activity where appropriat
Any questions or comments about this policy should be directed to Information Systems.

2.0 Scope

This policy applies to all Cebu Normal University owned equipment and non-CNUowned equipment that contains university related data.

3.0 Policy

Cebu Normal University understands the risks involved in storing data on various means of media, and also understands the need to ensure this data is secure. To do this, Cebu Normal University requires the secure deletion of all files and information in multiple situations. These situations are described below.
  • Transfers within a Department – This situation will occur when there is a change of some sort of device (computer, laptop, external media, etc.) within the department from one person or group to another. This situation does not always require disk sanitization if the new party has the appropriate rights to the information contained on the device. If the new party does not need the information or does not have the rights to the information, then the appropriate steps should be made to ensure the device is sanitized.
  • Transfers to a Different Department – When devices are transferred between departments, all information should be cleaned before the transfer occurs. The device should retain the data only if the two department managers/directors agree that the data needs to be shared between them.
  • Device Disposal or Transfer Off Campus – If the device is going to be disposed of or removed from inventory, then all data should be erased before leaving campus.

4.0 Enforcement

All system administrators, support personnel, and/or the device owner are responsible for ensuring the device is properly sanitized or sent to Property Services for processing. The method used to sanitize the device will greatly vary depending on the level of confidentiality of the data. Refer to the Data Sanitation Standard for the level of sanitation that will be required. Any questions can be directed to the system administrator or the Data Protection Officer.

5.0 Definitions

Cebu Normal University Network

Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Cebu Normal University.




Email Policy

1.0 Overview

Cebu Normal University is committed to protecting its employees, students, and the university from illegal or damaging actions, either intentional or unintentional, through the use of email. Cebu Normal University’s intentions for publishing an email policy are not to impose restrictions that are contrary to Cebu Normal University’s established culture of openness, trust and integrity but rather to outline the appropriate use of email as a means of communication.

2.0 Purpose

The purpose of this policy is to ensure the proper use of Cebu Normal University’s email system. Users are subject to the CNU Information Technology Privacy Policy and consistent with it email can be monitored without prior notification. Any questions or comments about this policy should be directed to Information Systems.

3.0 Scope

This policy applies to students, faculty, staff, or individuals external to CNU that utilize the Cebu Normal University email system. All messages distributed or received via the university’s email system, even personal emails, are subject to all CNU Information Technology Policies.

4.0 Policy

Users are strictly prohibited from:
  • Sending unsolicited email messages such as chain mail or spam.
  • Forging or attempting to forge email messages, or disguising or attempting to disguise your identity when sending mail.
  • Giving out a password for any type of CNU account via email.
  • Users are strictly required to:
    Delete spam, chain, and other junk email without forwarding.
Duty of care
Users must take the same care in sending an email as they would for any other communication. Employees must exercise the utmost caution when sending email. Sensitive information, as defined by departments and discussed in the Information Sensitivity Policy, must not be forwarded via any means, unless that email is critical to business and is encrypted in accordance with the Acceptable Encryption Policy.

In addition, users are reminded that they will be held responsible for the content of e-mail the same as with any other communication. An e-mail which is defamatory may lead to the user being sued by the defamed individual. An employee who sends a sexually harassing e-mail may be disciplined in accordance with CNU’s Equal Opportunity Grievance Procedure. A user who sends an e-mail which threatens the commission of a crime may be arrested. Thus, e-mail does not insulate users from responsibilities which otherwise exist. All users of CNU e-mail must be aware of the “E-Mail Communications Policy,” which is Policy 2.27 of the Board of Regents Policy Manual. This provides that, with some exceptions, e-mail may be used as an official means of communication with students, faculty, and staff.

Personal usage
Although the university’s email system is meant for academic/business communication, Cebu Normal University allows the personal use of email as long as it complies with university policies and does not interfere with productivity or the mission of the university. Personal e-mail, however, is not exempt from the Information Technology Privacy Policy, including the provisions there related to monitoring and access.

5.0 Definitions

Spam

Spam is any unauthorized and/or unsolicited electronic mass mailings.




Incident Response Policy

1.0 Overview

In order to reduce exposure to our user information and other confidential information, we have developed this policy as a means to define the appropriate actions to take should any of the university’s systems be compromised.

2.0 Purpose

In the unlikely event that a security breach occurs, Cebu Normal University staff will escalate all known information to the appropriate managers. In addition, staff are authorized to take any immediate and appropriate actions to ensure no further damage is sustained. For examples of possible security incidents please click here. Any questions or comments about this policy should be directed to Information Systems.

3.0 Scope

This policy applies to all systems, networks, and data within the university’s operating environment.

4.0 Policy

Users are strictly prohibited from:
Immediately following the detection of a breach of security, the ICTO-Head and the Data Protection Officer must be notified. All issues must be documented on the Incident Reporting Form and supplied to the Data Protection Officer following the incident. Secure mechanisms should be used for all communications regarding the breach. Use communications that do not involve the compromised system or network. Do not send email from compromised systems or networks. Upstream sites (sites that were involved in an intrusion prior to the system becoming involved) and downstream sites (sites that were involved after the site experienced an intrusion) need to be informed of the attacks as well. The Data Protection Officer will ensure that all other organizations are informed about the involvement of their systems so they too can take necessary steps to respond to an intrusion. The Data Protection Officer must ensure that an accurate, detailed log of all contacts and the information exchanged is maintained. Information pertaining to a security breach will only be released by the Vice President of Finance and Administration.

5.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Cebu Normal University.

Examples of Information Security Incidents
  • This page has been created to help understand what circumstances an Incident Reporting Form needs to be filled out and reported. This includes, but is not limited to, the following:
    • Unauthorized disclosure of sensitive information
    • Theft or loss of equipment that contains private or potentially sensitive information
    • Extensive virus or malware outbreak and/or traffic
    • Attempts (either failed or successful) to gain unauthorized access to a system or it's data
    • Compromised user account
    • Responding to a phishing email or having any other Cebu Normal University account compromised (ex. Active Directory, HRIS, etc.)
    • Extensive disruption of Cebu Normal University's information services




    Information Sensitivity Policy

    1.0 Purpose

    The Information Sensitivity Policy is intended to help employees in determining appropriate technical security measures which are available for electronic information deemed sensitive. The information covered in this policy includes electronic information stored on computers, e-mails, information on computer screens, and information shared orally or visually (such as cellular telephone and video conferencing). While this policy gives a general overview of the handling of sensitive information, users must be aware of additional Information Technology Policies that may enforce more specific requirements. Questions about the proper classification of a specific piece of information should be addressed to your manager. Any questions or comments about this policy should be directed to Information Systems.

    2.0 Scope

    Offices across campus deal with a wide range of electronic information covering a wide range of topics. It is the responsibility of each employee and department which handles electronic information to be familiar with the types of information being handled, any legal requirements which surround the information, the level of sensitivity which should be attached to the information, and the available technologies for protecting that information.

    3.0 Policy

    The Sensitivity Guidelines below provide details on how to protect information at varying sensitivity levels. The sensitivity level to be assigned to electronic information may be assigned by any area which handles the information.

    3.1 Network Control

    Electronic distribution: Approved electronic mail and electronic file transmission methods to only approved recipients.
    Encryption: Not required
    Storage: Keep from view of unauthorized individuals; machines should be administered with security in mind. Electronic information should have individual access controls where possible and appropriate.
    Disposal/Destruction: If destruction is allowed by the Record Retention Policy, electronic data should be disposed of according to the Data Sanitation Policy.

    3.2 More Sensitive

    Electronic distribution: Approved electronic mail and electronic file transmission methods to only approved recipients. Should be encrypted, consistent with the Acceptable Encryption Policy, or sent via a private link to approved recipients.
    Encryption: Recommended, consistent with the Acceptable Encryption Policy.
    Storage: Individual access controls are highly recommended for electronic information.
    Disposal/Destruction: If destruction is allowed by the Record Retention Policy, electronic data should be disposed of according to the Data Sanitation Policy.

    3.3 Most Sensitive

    Electronic distribution: Approved electronic file transmission methods. Must be strongly encrypted, consistent with the Acceptable Encryption Policy.
    Encryption: Required, consistent with the Acceptable Encryption Policy.
    Storage: Individual access controls are required for electronic information. Physical security is generally used, and information should be stored on a physically secured computer.
    Disposal/Destruction: If destruction is allowed by the Record Retention Policy, electronic data should be disposed of according to the Data Sanitation Policy.

    4.0 Enforcement

    Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with Cebu Normal University.

    5.0 Definitions

    Approved Electronic File Transmission Methods

    Includes supported SFTP clients, SSH sessions, VPN tunnels, and HTTPS.
    Approved Electronic Mail Includes all mail systems supported by the CNU Information Systems Department. If you have a business need to use other mailers, contact the CNU Information Systems Department.
    Individual Access Controls Individual Access Controls are methods of electronically protecting files from being accessed by individuals other than those specifically authorized. On most operating systems this is referred to as file permissions.
    Encryption Encryption is a procedure used to convert data from its original form to a format that is unreadable and/or unusable to anyone without the tools/information needed to reverse the encryption process.




    Mobile Device Policy

    1.0 Overview

    Portable computing devices, including but not limited to Personal Data Assistants (PDA), Blackberry devices, iPhones, laptop/tablet computers, etc., are becoming increasingly powerful and affordable. Their small size and functionality are making these devices ever more desirable to replace traditional desktop devices in a wide number of applications. However, the portability offered by these devices increases the risk that information stored or transmitted on them will be exposed. Cebu Normal University allows personal mobile computing devices to be used for business purposes as long as those devices adhere to the guidelines as stated below.

    2.0 Purpose

    The purpose of the Cebu Normal University Mobile Device Policy is to establish the rules for the use of mobile computing devices. These rules are necessary to preserve the integrity, availability and confidentiality of Cebu Normal University information. Any questions or comments about this policy should be directed to Information Systems.

    3.0 Scope

    This policy applies to students, faculty, staff, or individuals external to CNU who own or operate a mobile device that communicates with Cebu Normal University’s equipment, networks, or stores CNU data in any way.

    4.0 Policy

    Listed below are the minimum guidelines when using a mobile device. Users must also follow additional guidelines which are defined in the Mobile Device Standard.
    • Cebu Normal University sensitive data should not be stored on portable computing devices. However, in the event that there is no alternative to local storage, all sensitive Cebu Normal University data must be encrypted using approved encryption techniques and password protected.
    • Cebu Normal University sensitive data must not be transmitted via wireless communication to or from a portable computing device unless approved wireless transmission protocols along with approved encryption techniques are utilized.
    • All remote access to Cebu Normal University information resources must use a Cebu Normal University approved communication channel (e.g., Virtual Private Network (VPN), and web-based access to resources provided using the web, etc.).
    • Computer systems not owned by Cebu Normal University that require network connectivity must conform to Cebu Normal University's information security policies and procedures.
    • All mobile computing devices must have approved virus and spyware detection/protection software along with personal firewall protection (where applicable).
    • Unattended portable computing devices must be physically secured.

    5.0 Enforcement

    Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Cebu Normal University.

    6.0 Definitions

    Cebu Normal University Network

    Being connected to a Cebu Normal University network includes the following:
    • If you have a network capable device (ex. laptop) plugged into a Cebu Normal University owned building, then you are connected to the CNU LAN (local area network).
    • If you have a wireless capable device (ex. laptop, iPhone) and connect to CNUWireless or CNUSecure, then you are connected to the CNU WLAN (wireless local area network).
    • If you connect from a computer through the Cebu Normal University VPN (virtual private network), you are then connected to the CNU LAN (local area network).
    • Extensive virus or malware outbreak and/or traffic




    Password Policy

    1.0 Overview

    Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may compromise Cebu Normal University’s resources. As such, all students, faculty, staff, or individuals external to CNU who use CNU information technology resources are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.

    2.0 Purpose

    The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change. Any questions or comments about this policy should be directed to Information Systems.

    3.0 Scope

    The scope of this policy includes all individuals (students, faculty, staff, or individuals external to CNU) who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any Cebu Normal University facility, has access to the Cebu Normal University network, or stores any Cebu Normal University information regardless of location.

    4.0 Policy

    4.1 General

    Listed below are the minimum guidelines when using a mobile device. Users must also follow additional guidelines which are defined in the Mobile Device Standard.
    •  All system-level passwords (e.g., root, enable, NT admin, application administration accounts, etc.) must be changed at least annually.
    •  All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least every six months.
    •  After the departure of an employee, any user-level accounts for that individual must be disabled or changed to a role suitable to their status, and all system-level passwords known to that individual should be changed as soon as possible, not to exceed 3 days.
    •  Passwords must not be inserted into email messages or other forms of electronic communication (unless encrypted in accordance with Acceptable Encryption Policy).
    •  Where SNMP is used, the community strings must be defined as something other than the standard defaults of "public," "private" and "system" and must be different from the passwords used to log in interactively.
    •  All user-level and system-level passwords must conform to the guidelines described below.

    4.2 Guidelines

    4.2.1 General Password Construction Guidelines

    Some of the more common uses of passwords include: user level accounts, web accounts, email accounts, screen saver protection, voice mail password, and local router logins. Since very few systems have support for one-time tokens (i.e., dynamic passwords which are only used once), everyone should be aware of how to select strong passwords.

    Weak passwords have the following characteristics which must be avoided:
    • The password contains less than eight characters
    • The password is a word found in a dictionary (in any language)
    • The password is a common usage word such as:
    • Names of family, pets, friends, co-workers, fantasy characters, etc.
    • Computer terms and names, commands, sites, companies, hardware, software.
    • The words "Cebu Normal University", "murray", "racers" or any derivation.
    • Birthdays and other personal information such as addresses and phone numbers.
    • Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.
    • Any of the above spelled backwards.
    • Any of the above preceded or followed by a digit (e.g., secret1, 1secret)

      Strong passwords have the following characteristics which will be followed regardless of system imposed restrictions:
    • Are at least eight alphanumeric characters long.
    • Are not words in any language, slang, dialect, jargon, etc.
    • Contain both upper and lower case characters (e.g., a-z, A-Z)
    • Have digits and punctuation characters as well as letters e.g., 0-9, !@#$%^&*()_+|~-=\`{}[]:";'<>?,./)\
    • Are not based on personal information, names of family, etc.

      Passwords should never be written down or stored online. Try to create passwords that can be easily remembered. One way to do this is creating a password based on a song title, affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.

      NOTE: Do not use any of these examples as passwords!

    4.2.2 Password Protection Standards

    Do not use the same password for Cebu Normal University accounts as for other non-Cebu Normal University access (e.g., personal ISP account, personal email, forums, etc.). Where possible, don't use the same password for various Cebu Normal University access needs.
    Do not share Cebu Normal University passwords with anyone, including administrative assistants or secretaries. All passwords are to be treated as sensitive, confidential Cebu Normal University information.

    Compliance with the following is required:

    • Don't reveal your password over the phone to ANYONE
    • Don't reveal a password in an email message
    • Don't reveal a password to any supervisor
    • Don't talk about a password in front of others
    • Don't hint at the format of a password (e.g., "my family name")
    • Don't reveal a password on questionnaires or security forms
    • Don't share a password with family members
    • Don't reveal a password to co-workers while away from the office
    • Don't write passwords down and store them anywhere in your office
    • Don't store passwords in a file on ANY computer system (including Palm Pilots or similar devices) without encryption
    • Don't use the "Remember Password" feature or the "Remember Me" on any application that contains sensitive data as defined by the Information Sensitivity Policy

      If someone demands a password, refer them to this document or have them call the Data Protection Officer.

      If an account or password is suspected to have been compromised, report the incident immediately to the Data Protection Officer and change all passwords.

      Password cracking or guessing may be performed on a periodic or random basis by the Information Security personnel. If a password is guessed or cracked during one of these scans, the user will be required to change it.

    4.2.3 Application Development Standards


    Application developers must ensure their programs contain the following security precautions. Applications:

    •  Should not store passwords in clear text or in any easily reversible form.
    •  Should provide for some sort of role management, such that one user can assume the functions of another without having to know the other's password where possible.
    •  Require technical measures to enforce the password complexity requirements.

    4.2.4 Application Development Standards


    Pass phrases are generally used for public/private key authentication. A public/private key system defines a mathematical relationship between the public key that is known by all, and the private key, that is known only to the user. Without the pass phrase to "unlock" the private key, the user cannot gain access.

    Pass phrases are not the same as passwords. A pass phrase is a longer version of a password and is, therefore, more secure. A pass phrase is typically composed of multiple words. Because of this, a pass phrase is more secure against "dictionary attacks."

    A good pass phrase is relatively long and contains a combination of upper and lowercase letters and numeric and punctuation characters. An example of a good pass phrase:

    "ThekrazyTrafficOn$*($%@)(WasnUtsThisMorning"

    All of the rules above that apply to passwords apply to pass phrases.

    5.0 Enforcement

    Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Cebu Normal University.

    6.0 Definitions

    Application Administration Account

    Any account that is for the administration of an application (e.g., Oracle database administrator, SAN administrator).

    SNMP (Simple Network Management Protocol)

    SNMP is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
    Cebu Normal University Network

    Being connected to a Cebu Normal University network includes the following:
    • If you have a network capable device (ex. laptop) plugged into a Cebu Normal University owned building, then you are connected to the CNU LAN (local area network).
    • If you have a wireless capable device (ex. laptop, iPhone) and connect to CNUWireless or CNUSecure, then you are connected to the CNU WLAN (wireless local area network).
    • If you connect from a computer through the Cebu Normal University VPN (virtual private network), you are then connected to the CNU LAN (local area network).




    Removable Media Policy

    1.0 Overview

    Removable media is a well-known source of malware infections and has been directly tied to the loss of sensitive information in many organizations.

    2.0 Purpose

    The purpose of this policy is to minimize the risk of loss or exposure of sensitive information maintained by Cebu Normal University and to reduce the risk of acquiring malware infections on computers operated by Cebu Normal University. Any questions or comments about this policy should be directed to Information Systems.

    3.0 Scope

    This policy covers all removable media that contains Cebu Normal University data or that is connected to a Cebu Normal University network.

    4.0 Policy

    Cebu Normal University staff may use removable media in their work computers. Sensitive information should be stored on removable media only when required in the performance of assigned duties or when responding to legitimate requests for information. When sensitive information is stored on removable media, it must be encrypted. Exceptions to this policy may be requested on a case-by-case basis by petition to Information Systems.

    5.0 Enforcement

    Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with Cebu Normal University.

    6.0 Definitions


    Removable Media

    Removable media is defined as devices or media that is readable and/or writable by the end user and are able to be moved from computer to computer without modification to the computer. This includes flash memory devices such as thumb drives, SD cards, cameras, MP3 players and PDAs; removable hard drives (including hard drive-based MP3 players); optical disks such as CD and DVD disks; floppy disks and software disks not provided by Cebu Normal University.
    Encryption
    Encryption is a procedure used to convert data from its original form to a format that is unreadable and/or unusable to anyone without the tools/information needed to reverse the encryption process.
    Malware
    Malware is defined as software of malicious intent/impact such as viruses, worms, and spyware.
    Cebu Normal University Network

    Being connected to a Cebu Normal University network includes the following:
    • If you have a network capable device (ex. laptop) plugged into a Cebu Normal University owned building, then you are connected to the CNU LAN (local area network).
    • If you have a wireless capable device (ex. laptop, iPhone) and connect to CNUWireless or CNUSecure, then you are connected to the CNU WLAN (wireless local area network).
    • If you connect from a computer through the Cebu Normal University VPN (virtual private network), you are then connected to the CNU LAN (local area network).

    • Sensitive Information

      Sensitive information is defined as information which, if made available to unauthorized persons, may adversely affect Cebu Normal University, its programs, or participants served by its programs. Examples include, but are not limited to, personal identifiers and financial information. The determination of sensitivity is the responsibility of individual departments.




    Wireless Communication Policy

    1.0 Purpose

    This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to the Cebu Normal University network. Only those wireless infrastructure devices that meet the standards specified in this policy or are granted an exception by Information Systems are approved for connectivity to a Cebu Normal University network. Any questions or comments about this policy should be directed to Information Systems.

    2.0 Scope

    All employees, students, contractors, consultants, and temporary workers at Cebu Normal University, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of Cebu Normal University, must adhere to this policy. This policy applies to all wireless infrastructure devices that connect to a Cebu Normal University network or reside on a Cebu Normal University site that provides wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones, and personal digital assistants (PDAs). This includes any form of wireless communication device capable of transmitting packet data.

    3.0 Policy

    3.1 General Network Access Requirements

    All wireless infrastructure devices that reside at a Cebu Normal University site or connect to a Cebu Normal University network must:
    • Be installed, supported, and maintained by Information Systems.
    • Use Cebu Normal University approved authentication protocols and infrastructure.
    • Use Cebu Normal University approved encryption protocols.
    • Maintain a hardware address (MAC address) that can be registered and tracked.
    • Not interfere with other wireless access deployments.


    3.2 Lab and Isolated Wireless Device Requirements


    Lab and isolated wireless devices must:
    •  Be approved by Information Systems.
    •  Not interfere with other wireless access deployments.
    The Sensitivity Guidelines below provide details on how to protect information at varying sensitivity levels. The sensitivity level to be assigned to electronic information may be assigned by any area which handles the information.

    4.0 Enforcement

    Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. Also any rogue access points found on the CNUproperty may be confiscated. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including termination of their contract or assignment with CNUUniversity.

    5.0 Definitions

    Wireless infrastructure devices

    Wireless infrastructure devices are devices that provide wireless connectivity. Some examples of these devices are wireless access points, repeaters, bridges, etc.