Skip to main content

Information Security

  1. Purpose and Background
  2. Gramm-Leach-Bliley and FACT Act Requirement
  3. Designated Security Program Officers
  4. Customer Information
  5. Privacy Provisions
  6. Security Provisions
  7. Physical Safeguards
  8. Technical Safeguards
  9. Employee Management and Training
  10. Outside Service Providers
  11. Reassessment of Plan
  12. Appendix A: Swarthmore - Fact Act “Red Flags” Plan
    1. Definitions
    2. Identification of Relevant Red Flags
    3. Detection of Red Flags
    4. Response
  13. Appendix B: Swarthmore - Information Technology Services Security Program
    1. Background
    2. ITS Practices/Policies
    3. Definition of Administrative Information
    4. Employee Information
    5. Family Educational Rights and Privacy Act (FERPA)
    6. Student "Directory Information", as defined by FERPA
    7. Security process of the central administrative database (Banner)
    8. Responsibility of Institutional Offices
    9. External Vendor Management Policy for Handling Sensitive Data

1. Purpose and Background

In order to protect confidential information and data, and to comply with federal laws, this document summarizes the College’s comprehensive written information security and identity theft prevention program. The Gramm-Leach-Bliley Act of 2000 (GLB) mandates that financial institutions must take steps to safeguard the security and confidentiality of customer information. The Federal Trade Commission (FTC) ruled that GLB applies to institutions of higher education. Compliance with GLB involves compliance with 1/ the privacy provisions of the act and 2/ provisions regarding the safeguarding of customer information. The Fair and Accurate Credit Transactions Act (FACT Act) requires financial institutions to establish a program to help detect, prevent and mitigate identity theft of “covered accounts”. The FTC has said that colleges are deemed in compliance with the privacy provisions of GLB if they are in compliance with the Family Educational Rights and Privacy Act (FERPA). With respect to the second area, GLB and the FACT Act specify new requirements for colleges to safeguard non-public customer information and certain covered accounts, such as family financial information and social security and identification numbers, by having an institutional security program and security plans in specific offices of the college that handle such information.

2. Gramm-Leach-Bliley and FACT Act Requirements

GLB mandates that the College designate information security program representatives to coordinate the information security program, conduct a risk assessment of likely security and privacy risks, institute a training program for all employees who have access to customer information, oversee service providers and related contracts, and evaluate and adjust this program periodically. The FACT Act has similar requirements including mandating schools to have a program to identify, detect and respond appropriately to relevant “red flags” which is further detailed in Appendix A.

3. Designated Security Program Officers

The designated GLB Security Program Officers for Swarthmore College are the Vice President for Finance and Treasurer and the CITO.  All correspondence and inquiries about the Swarthmore College Information Security and Identity Theft Prevention Plan should be directed to one of these Officers.

4. Customer Information

For purposes of FERPA and GLB, the College considers students, employees, alumni and any other third party engaged in a financial transaction with Swarthmore College as “customers”. Customer information that must be safeguarded is “any record containing nonpublic personal information about a customer, whether in paper, electronic, or other form.” It includes financial information, tuition and loan accounts, academic and employment information, and other private paper and electronic records.

5. Privacy Provisions

With respect to the privacy provisions of the GLB Act, Swarthmore College is in compliance with FERPA. Directory information (for example, name, address, enrollment at the college and degree information), the list of which is published yearly in the Student Handbook, is considered public (unless a student has requested otherwise in writing). All non-directory information is restricted or confidential, what GLB calls "non-public." Under FERPA, restricted information (for example, academic or financial records) is released outside the college only with the student's written consent. Designated school officials, including faculty, key employees and occasionally outside service providers, have access to restricted, “non-public” information on a need-to-know basis only. Confidential information (for example, a faculty member's or dean's private notes) is even more protected than restricted information, and released only in certain unusual circumstances as outlined in FERPA. Although FERPA if narrowly construed only applies to enrolled students and past students, in compliance with GLB and long standing good practice, the College extends FERPA privacy protections to all customers of the college.

The Registrar’s Office will provide guidance in complying with all FERPA privacy regulations. In addition, the College also complies with HIPAA (Health Insurance Portability and Accountability Act of 1996) with the Health Center and Human Resources providing guidance on this Act. Each department is responsible for securing customer information in accordance with all privacy guidelines.

6. Security Provisions

With respect to the safeguarding provisions of the GLB Act, the Swarthmore College GLB Information Security Plan herein is designed to ensure the security, integrity, and confidentiality of non-public customer information, protecting it against anticipated threats, and guarding it against unauthorized access or use. Covered under the Plan are administrative, technical, and physical safeguards used in the collection, distribution, processing, protection, storage, use, transmission, handling, or disposal of non-public customer information. The Plan covers actions by both employees of the College and outside service providers.

The policies incorporated in this document apply to all College departments. In addition, in the case that individual departments may have additional security provisions, they will maintain written documentation of these and will make them available to the Security Program Officers. For example, the information technology department will maintain and provide access to policies and procedures that protect against any anticipated threats to the security or integrity of electronic customer information and that guard against the unauthorized use of such information.

The College security policies for departments include the elements described in the following sections.

7. Physical Safeguards

The College uses direct personal control or direct supervision to control access to and handling of all non-public customer information when an office is open. Whether the information is stored in paper form or any electronically accessible format, departmental non-public information is maintained, stored, transmitted and otherwise handled under the direct personal control of an authorized employee of the College.

Departmental non-public information is collected, processed, transmitted, distributed and ultimately disposed of with constant attention to its privacy and security. Conversations concerning non-public information are held in private. Papers with non-public information are mailed via official campus mail, US mail, or private mail carrier. Departments are encouraged to password-protect electronic files of non-public information when transmitting electronically. When best practices permit the disposal of non-public information, it is destroyed; paper containing such information is routinely shredded or otherwise destroyed.

Confidential material is kept secure. Most offices have locked windows and locked doors with restricted access. For those that do not, materials are kept in locked filing cabinets or other locked storage areas. When offices are open, confidential information is kept out of sight from visitors, and computer screens are not visible to visitors. Offices and/or computers are locked when the office will be vacant for an extended length of time.

Key access (physical or electronic) is limited to authorized College employees only, in the context of College key control/card access governing the distribution of keys or specific card access. College Public Safety and the OneCard office further ensure the security of offices after hours.

Departmental offsite storage and information processing generally conforms to the same practices as onsite storage, and is safeguarded under the provisions for outside service providers, as described below.

8. Technical Safeguards

The College relies on the Information Technology Services Department to provide network security and administrative software password access security according to industry standards in order to protect non-public customer information that is accessed electronically but stored outside of a department.

Departmental desktop computers and other electronic devices storing non-public customer information are protected by physical safeguards.

The Information Technology Services Department maintains its own written security policy which is incorporated with the overall College policy. This is included as Appendix B.

9. Employee Management and Training

All College employees, including part-time and temporary employees, and volunteers are given specific training by their supervisors about issues of security of sensitive and confidential material used in their respective offices. Employees are held accountable to know that although they have access to non-public information in order to perform their duties for the College, they are not permitted to access it for unapproved purposes or disclose it to unauthorized persons. Employees are trained to detect and not respond to “pretext calling” or e-mail “phishing” which occurs when someone attempts to obtain confidential information via unauthorized calls or electronic means in order to commit identity theft. The Employee Handbook, which is provided to all employees, states that violation of security policies could result in termination of employment or legal action, or both.

10. Outside Service Providers

Each area will assure that third party service providers are required to maintain appropriate safeguards for nonpublic information to which they have access. Contracts with service providers, who within their contracts have access to Swarthmore College non-public customer information, shall include the following provisions as appropriate:

Explicit acknowledgment that the contract allows the contract partner access to confidential information;

Specific definition of the confidential information being provided;

Stipulation that the confidential information will be held in strict confidence and accessed only for the explicit business purpose of the contract;

Guarantee from the contract partner that it will ensure compliance with the protective conditions outlined in the contract;

Guarantee from the contract partner that it will protect the confidential information it accesses according to commercially acceptable standards and no less rigorously than it protects its own customers' confidential information;

Provision allowing for the return or destruction of all confidential information received by the contract partner upon completion of the contract;

Stipulation allowing the entry of injunctive relief without posting bond in order to prevent or remedy breach of the confidentiality obligations of the contract;

Stipulation that any violation of the contract's protective conditions amounts to a material breach of contract and entitles Swarthmore College to immediately terminate the contract without penalty;

Provision allowing auditing of the contract partners' compliance with the contract safeguard requirements;

Provision ensuring that the contract's protective requirements shall survive any termination agreement.

10. Reassessment of Plan

This Plan and any other individual departmental policies are reviewed at least annually and adjusted as needed. The GLB Security Program Officers circulate this policy to each department and request a reassessment. The annual reviews include identification and assessment of internal and external risks to the security, integrity, and confidentiality of non-public customer information and covered accounts, including review of outside contractors and their contracts to ensure that proper safeguards are in place.

11. APPENDIX A
SWARTHMORE - FACT Act “Red Flags” Plan

a. Definitions

Identity Theft: A fraud committed or attempted using the identifying information of another person without authority.

Red Flags: Patterns, practices and specific activities that signal possible existence of identity theft. Covered Accounts: A customer account that involves multiple payments or transactions. For Swarthmore, these include student tuition accounts with a payment plan, Perkins/Swarthmore loans, and employee mortgage loans.

b. Identification of Relevant Red Flags

The following should be considered relevant red flags:

  1. Alerts, notifications, or other warnings received from consumer reporting agencies, service providers, and fraud detection services.
  2. The presentation of suspicious documents, such as a photo ID not appearing to be authentic or not matching the appearance of the person presenting it.
  3. The presentation of suspicious personal identifying information, including address discrepancies.
  4. The unusual use of, or other suspicious activity related to a covered account.
  5. Notice from customers, victims of identity theft, law enforcement, or other persons regarding possible identity theft in connection with covered accounts.

c. Detection of Red Flags

College employees shall be aware of these red flags and shall take precautions as circumstances warrant such as verifying the identity of customers opening a covered account; and authenticating customers, monitoring transactions, and verifying related data in the case of existing covered accounts.

d. Response

The College shall, as appropriate, incorporate and review existing policies and procedures to prevent and mitigate reasonably the risk of identity theft. For example, the College may require a photo ID before approving refunds from a covered account and mails refunds to the student’s mailbox or student’s or parent’s address of record.

When identity theft or fraud is suspected, the College shall provide appropriate responses such as contacting the customer, requiring additional information, changing passwords or other security codes, denying access to or closing the covered account, contacting the College’s Department of Public Safety and notifying law enforcement. The College may also determine that no response is warranted under the particular circumstances.

12. APPENDIX B
SWARTHMORE - INFORMATION TECHNOLOGY SERVICES SECURITY PROGRAM

a. Background

Protecting customer information is a shared responsibility between institutional offices and the Information Technology Services staff. Institutional offices have policies and processes in place in each relevant area where a risk to customer information is evident. Those offices include: Alumni and Development, Registrar’s Office, Financial Aid Office, Admissions Office, Human Resources, and Student Accounts Receivable Office, Health Center, and Residence Life.

Information Technology Services (ITS) will maintain and provide access to policies and procedures that protect against any anticipated threats to the security or integrity of electronic customer information and that guard against the unauthorized use of such information. This document is an outline of ITS practices in place that protect electronic information.

b. ITS Practices/Policies

Network security, including firewall technology, has been implemented to protect administrative servers and departmental workstations from unauthorized access through the Internet. Staff in administrative and faculty offices connect to secured computers on the campus network. Off campus access to this subnet is provided through a secure Virtual Private Network (VPN) complete with encryption and an additional layer of password security.

Desktop computers in administrative offices provide the most vulnerable point of access to administrative systems. Desktop computers are physically locked to desktops and are behind a firewall.

Nightly backups of important documents and files secures information from loss.

Printed reports containing confidential and sensitive data are secured within offices or behind locked doors in the central computer room. Reports that are no longer needed, containing confidential and/or sensitive data, are shredded or stored securely until they are shredded.

In addition to network and physical security, the logical security plans are a fundamental layer of protection. These plans are the key to protecting administrative information and describe the procedures by which system privileges are granted, passwords maintained, security monitored and issues communicated.

System privileges are authorized by the Department Head or designated Department security manager and centrally assigned by ITS system administrators in the Enterprise Services group. Department Heads include the Vice President & Dean of Admissions, Registrar, Controller, VP for Human Resources, Director of Financial Aid, etc.

Faculty and staff granted access to institutional data may do so only to conduct College business. In this regard, employees must:

  • Respect the confidentiality and privacy of individuals whose records they access
  • Observe ethical restrictions that apply to the data to which they have access
  • Abide by applicable laws or policies with respect to access, use, or disclosure of information

Employees may not:

  • Disclose data to others, except as required by their job responsibilities
  • Use data for their own personal gain, nor for the gain or profit of others
  • Access data to satisfy their personal curiosity

Employees and students who violate this policy are subject to the investigative and disciplinary procedures of the College. The Office of the Dean of Students handles complaints against students. The Provost handles complaints against faculty. Complaints against staff and administrators are handled through Supervisors or Human Resources.

c. Definition of Administrative Information

Administrative information is any data related to the business of the College including, but not limited to, financial, personnel, student, alumni, and physical resources. It includes data maintained at the departmental and office level as well as centrally, regardless of the media on which they reside. Administrative information does not include library holdings or instructional notes unless they contain information that relates to a business function. The College recognizes administrative information as a College resource requiring proper management in order to permit effective planning and decision-making and to conduct business in a timely and effective manner. Employees are charged with safeguarding the integrity, accuracy, and confidentiality of this information as part of the condition of employment.

Access to administrative systems is granted based on the employee’s need to use specific data, as defined by job duties, and subject to appropriate approval. As such, this access cannot be shared, transferred or delegated. Failure to protect these resources may result in disciplinary measures being taken against the employee, up to and including termination.

Requests for release of administrative information are referred to the office responsible for maintaining those data. The College retains ownership of all administrative information created or modified by its employees as part of their job functions. Administrative information is categorized into three levels:

Administrative Information Classifications
Risk Level Descriptions Examples
High Risk  (Confidential) Requires a high level of protection due to the risk and magnitude of loss or harm that could result from disclosure, alteration or destruction of the data. This includes information whose improper use or disclosure could adversely affect the ability of the College to accomplish its mission as well as records that are protected by law, regulation, contractual obligation, notification requirement or determination by the College. Student financial aid information, protected health records, legally protected and/or compliance required information (e.g. FERPA, HIPAA protected), personnel data (e.g. salary and benefits information), payment and accounting information, alumni gifts, student grades/test scores, passwords/PINS, and any other PII (personally-identifiable information).
Medium Risk (Sensitive) Requires some level of protection because unauthorized disclosure, alteration, or destruction might cause damage to the College. It is assumed that all administrative output from the administrative database is classified as sensitive unless otherwise indicated. Class lists, contract data, and vendor data information. Non-public contact information (e.g., employee home addresses). Competitive business and security information (e.g., recruitment techniques). Administrative data aggregated from institutional reports, systems (e.g. Banner), or websites.
Low Risk (Public) Can generally be made available both within and beyond the College. It should be understood that any information that is widely disseminated within the campus community is potentially available to the public at large. Campus contact information, publicly available reports, presentations, blogs, catalogs, annual reports, etc.

While the classifications above include examples of types of data, it is noted that collecting large amounts of a particular type of data such as data considered low risk, may reclassify the data to a higher level of risk. As an example, the process of “data-scraping” may inappropriately reuse data that is low risk when in the form of an individual record or data point, but higher risk when aggregated (e.g. contacts aggregated into a listserv).  

d. Employee Information

All aspects of personnel records are confidential. Directory information for faculty and staff as published in the Swarthmore College Telephone Directory is public. Directory information may include some or all of the following: name, home telephone, spouse/partner name, department, position title, campus address, campus phone and email address. All data maintained in the published Telephone Directory is also available on-line from off campus locations. Faculty and staff may request that this data be classified as confidential. All other employee related data, especially that which is available to users outside Human Resources such as social security number and birth date, must be vigilantly safeguarded and treated as confidential.

e. Family Educational Rights and Privacy Act (FERPA)

The Family Educational Rights and Privacy Act (FERPA) of 1974 governs all information about students, current and former, maintained by Swarthmore College. FERPA generally requires that Swarthmore College have the student's written permission to release any information from their records except certain types of "directory information."

f. Student "Directory Information", as defined by FERPA

Certain information, classified as "directory information", is available for public consumption unless the student specifically directs that it be withheld. The student may direct the Office of the Dean of Students not to disclose such information. Former students may contact Alumni Relations. Public directory information as defined by the Act includes: student’s name, address, telephone number, date and place of birth, email address, major field of study, participation in officially organized activities and sports, dates of attendance, degree and awards received, and the most recent previous educational institution attended.

g. Security process of the central administrative database (Banner)

Assigning privileges

Department data stewards (department heads or their designee) are responsible for authorizing system access to Banner. ITS System Administrators in Administrative Information Systems will assign that access.

A similar process exists for authorizing access to the course management system, email and share file storage.

The Security Request Form for Banner access must be completed by the Department manager to authorize, modify or remove user privileges.

Modification and Termination

ITS should be notified immediately as soon as an employee is terminated. The ITS System Administrator will disable all account access for that employee.

Passwords

Administrative information is protected through the vigilant use of user-defined passwords.

At a minimum, passwords must be:

  • Changed by the user on-line every one hundred and eighty days
  • Consist of letters, numbers and symbols
  • Eight characters in length, minimum
  • Significantly different from prior passwords

Banner users, ITS system administrators and those that deal with sensitive college data may be subject to more stringent password requirements.

Individuals are expected to protect passwords from disclosure including the transmission of passwords through email, instant messaging, etc. Every individual must have a unique user login.

h. Responsibility of Institutional Offices

Department Security Manager

The department head of each administrative office must assign a Department security manager and an alternate who is responsible to authorize and monitor access to the administrative system.

A Security Request Form must be completed for each individual who is provided access to the administrative system. This same form must be completed to modify or remove access. It is just as important to remove access to the administrative system, as it is to authorize access to the administrative system.

On a quarterly basis, the Department security manager will be required to review all security authorizations for the department. A report will be produced and distributed by the ITS System Administrators.

Communication to new employees

Department heads or security managers are responsible for discussing this policy with each employee at the time system privileges are issued. Effective, on-going communication of this security policy along with instruction regarding office procedures is the responsibility of each department head.

i. External Vendor Management Policy for Handling Sensitive Data

Purpose

The purpose of this policy is to protect the security and confidentiality of Swarthmore College’s sensitive and proprietary data handled or managed by external vendors.

SCOPE

This policy applies to external vendors who handle sensitive data on behalf of the College as defined in the Administrative Information Classifications. At a high level, sensitive data is defined as data that is confidential, sensitive and/or proprietary in nature, such as student records, financial information, and research data.  The College’s Administrative Information Classifications for High and Medium risk are specifically covered by this policy.  Moreover, this scope can be applicable even when individual data elements might not have a High or Medium level of risk, but their collective aggregation may.  Handling of the College’s data includes but is not limited to transmission by electronic means, whether to or from the College, and storage.

Definitions

  • Sensitive data is data that is confidential or sensitive in nature, such as student records, financial information, and research data.  Examples of data to be protected by this policy can be found in the Administrative Information Classification section of the Swarthmore College Information Security Policy.
  • External vendor is a company or organization that provides goods or services to the college.
  • Data handling or the exchange of data, includes electronic transmission and/or storage of Swarthmore College data.

Policy Requirements

  1. External vendors, along with their Swarthmore College sponsor, must clearly identify all types of sensitive data to be exchanged and managed.
  2. All external vendors who handle more than 250 High or Medium risk data records, as defined in the Administrative Information Classifications, must complete and submit to ITS (Information Technology Services) a completed HECVAT (Higher Education Cloud Vendor Assessment Toolkit) form during the procurement process.
    1. Depending on the quantity and type of data records being handled, ITS will determine whether the vendor needs to submit either a “Full” or a “Lite” version of the HECVAT
    2. The submitted HECVAT must have been completed or updated within the past 12 months
  3. External vendors who fall into GLBA (Gramm–Leach–Bliley Act) scope, at a minimum, must contractually provide an updated HECVAT each year that they are engaged with Swarthmore College.  Other external vendors may also be required to provide updated HECVATs annually.
  4. External vendors must implement and maintain security controls that are adequate to protect the confidentiality, integrity, and availability of sensitive data.