Division of Information Technology Policy 18.2a
Division of Information Technology Policy 18.2a
Division of Information Technology Policy 18.2a
2a
Information Security Reviews
Initially Approved: February 16, 2015
Policy Topic: Information Technology
Administering Office: Office of the CIO
I. Policy Statement
To ensure that information security is implemented and operated in accordance with policies and
procedures WCU’s approach to managing information security and its implementation (i.e. policies,
processes and procedures for information security) shall be reviewed independently at planned
intervals or when significant changes occur.
Managers shall regularly review the compliance of information processing and procedures within
their area of responsibility with the appropriate security policies, standards and any other security
requirements.
Information systems shall be regularly reviewed for compliance with WCU’s information security
policies and standards.
III. Definitions
Technical compliance reviews - The examination of operational systems to ensure that hardware and
software controls have been correctly implemented. This type of compliance review requires
specialist technical expertise.
Penetration testing and vulnerability assessments - Provide a snapshot of a system in a specific state
at a specific time which can be useful in detecting vulnerabilities in the system and for inspecting
how effective the controls are in preventing unauthorized access due to these vulnerabilities. They
might be carried out by independent experts specifically contracted for this purpose.
The Chancellor has established a Data Security and Stewardship Committee, which reports to the
Chancellor. The charge of this Committee is to oversee the implementation of security policy, ensure
procedures are up to date, coordinate all relevant security policy reviews, and assist offices with risk
assessments, etc.
IT security personnel are responsible for overseeing regular reviews of information system activities
to verify compliance with security policies and procedures and identify risks to information assets.
The Office of Internal Audit or a designated third-party will periodically review policy compliance.
Department managers are responsible for ensuring compliance with this policy and that the
appropriate corrective action is taken, which may include the implementation of additional controls,
employee training, and disciplinary action. Employee performance evaluations will include policy
compliance.
Failure to comply with this policy may result in the imposition of fines, or other significant penalties
against WCU, and disciplinary action against employees.
VI. References
International Standards Organization (ISO/IEC 27002, 18.2, Information Security Reviews)