University Rule 4-004K: Backup and Recovery Rev. 0
- PURPOSE AND SCOPE
- The purpose of this Backup and Recovery Rule is to protect the University's Information Systems and Information Assets by establishing requirements for backup and recovery.
- This Rule supports section K, titled Backup and Recovery, of the University of Utah Information Security Policy 4-004.
- DEFINITIONS
For the purposes of this Policy and any associated Regulations, these words and phrases have the following meanings: - Confidential - Any Information Asset which is classified as Restricted or Sensitive per the Data Classification and Encryption Rule
- Information Asset - Data or knowledge stored in any electronic manner and recognized as having value for the purpose of enabling University to perform its business functions.
- Information System - An Application or group of Servers used for the electronic storage, processing, or transmitting of any University data or Information Asset.
- Information System Media -Physical media on which an Information System's Information Assets are stored for backup and recovery purposes (e.g. backup tapes, backup disks, NAS/SAN drives, magnetic media, etc.).
- Server – Hardware and software, and/or Workstation used to provide information and/or services to multiple Users.
- RULE
- Information Asset Backup
- To ensure that all Confidential University Information Assets are available in the
event of a disruption, error, or disaster, the following controls will be implemented:
- Define the required level of backup for each classification of data per the Data Classification and Encryption Rule.
- Define the required level of backup for each Information System or Server that stores data.
- Define the frequency of backups for each Information System or Server.
- Establish an off-site storage location for backups at a sufficient distance to ensure separation from the primary University data center for where the data is housed.
- Ensure that the security controls implemented at the off-site backup storage location are appropriate to the criticality and the classification of the data.
- Ensure that appropriate security controls are implemented on the Information System Media itself in accordance with data handling requirements.
- Information System data backups will be retained in accordance with regulatory and contractual requirements.
- Test, and update as necessary, backup procedures to ensure that all security requirements have been met.
- To ensure that all Confidential University Information Assets are available in the
event of a disruption, error, or disaster, the following controls will be implemented:
- Information Recovery
- To ensure that all Confidential University Information Assets can be recovered in
the event of a disruption, error, or disaster, the following controls will be implemented:
- Test backup Information System Media regularly to ensure reliability if applicable.
- Test, and update as necessary, recovery procedures to ensure timeliness and effectiveness of recovery.
- To ensure that all Confidential University Information Assets can be recovered in
the event of a disruption, error, or disaster, the following controls will be implemented:
- [Note: Parts IV-VII of this Rule (and all other University Regulations) are Regulations Resource Information--the contents of which are not approved by the Academic Senate or Board of Trustees, and are to be updated from time to time as determined appropriate by the cognizant Policy Officer and the Institutional Policy Committee, as per Policy 1-001 and Rule 1-001.]
- Information Asset Backup
- RULES, PROCEDURES, GUIDELINES, FORMS, and OTHER RELATED RESOURCES
- Rules
- TBD
- Procedures
- Guidelines
- TBD
- Forms
- Other Related Resources Material
- Rules
- REFERENCES
-
- 45 C.F.R. 164: Health Insurance Portability and Accountability Act (HIPAA): Security and Privacy
- Family Educational Rights and Privacy Act of 1974 ("FERPA", 20 U.S.C. § 1232g)
- Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. § 3541)
- ISO 27002:2013, Information Technology - Security Techniques - Code of Practice for Information Security Controls
- NIST 800 Series, Federal Information Security Standards
- Policy 3-070: Payment Card Acceptance
- Policy 4-001: University Institutional Data Management
- Policy 4-003: World Wide Web Resources Policy
- Policy 5-111: Disciplinary Actions and Dismissal of Staff Employees
- Policy 6-400: Code of Student Rights and Responsibilities
- Policy 6-316: Code of Faculty Rights and Responsibilities
- Pub. 111-5, Division A, Title XIII, Subtitle D: Health Information Technology for Economic and Clinical Health Act (HITECH Act)
- Omnibus HIPAA Rule: 45 CFR Parts 160 and 164 - Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the HITECH Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule
-
- CONTACTS
- The designated contact Officials for this Policy are:
- Policy Owner (primary contact person for questions and advice): Chief Information Security Officer, 801-213-3397
- Policy Officer; Chief Information Officer, 801-581-3100
- These officials are designated by the University President or delegee, with assistance of the Institutional Policy Committee, to have the following roles and authority, as provided in University Rule 1-001:
- A 'Policy Officer' will be assigned by the President for each University Policy, and will typically be someone at the executive level of the University (i.e., the President and his/her Cabinet Officers). The assigned Policy Officer is authorized to allow exceptions to the Policy in appropriate cases...."
- "The Policy Officer will identify an 'Owner' for each Policy. The Policy Owner is an expert on the Policy topic who may respond to questions about, and provide interpretation of the Policy; and will typically be someone reporting to an executive level position (as defined above), but may be any other person to whom the President or a Vice President has delegated such authority for a specified area of University operations. The Owner has primary responsibility for maintaining the relevant portions of the Regulations Library.... [and] bears the responsibility for determining -requirements of particular Policies...." University Rule 1-001-III-B & E
- The designated contact Officials for this Policy are:
- HISTORY
- Current version: Revision 1, effective date: April 4, 2016
- Approved by Academic Senate: May 4, 2015
- Approved by Board of Trustees: May 12, 2015
- Background information for this version
- Current version: Revision 1, effective date: April 4, 2016
Rule: 4-004K Rev: 0
Date: April 4, 2016
Date: April 4, 2016