{"id":64,"date":"2020-04-13T14:25:44","date_gmt":"2020-04-13T14:25:44","guid":{"rendered":"http:\/\/inside.luthersem.edu\/technology\/?page_id=64"},"modified":"2025-04-03T14:55:26","modified_gmt":"2025-04-03T14:55:26","slug":"information-security-program","status":"publish","type":"page","link":"https:\/\/inside.luthersem.edu\/technology\/information-security-program\/","title":{"rendered":"Information Security Program"},"content":{"rendered":"\n<p>The protection of the private information of Luther Seminary community members is of critical importance to the Office of Technology (OT). &nbsp;The three components below describe in broad terms how the institution is protecting that private information. &nbsp;In addition, this program ensures compliance with Title IV financial aid requirements for protecting student financial aid information.<\/p>\n\n\n\n<p>Luther Seminary is taking three main approaches<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Defining<\/li>\n\n\n\n<li>Protecting<\/li>\n\n\n\n<li>Educating<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Defining<\/h2>\n\n\n\n<p>Through a&nbsp;<a href=\"https:\/\/inside.luthersem.edu\/technology\/policies\/\">data classification policy<\/a> Luther Seminary defines three types of data and how such data should be handled. &nbsp;These definitions provide a common language to describe the information used by departments in various ways. &nbsp;Those three types are<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Public Data<\/strong>. &nbsp;This is information that is available to the general public. &nbsp;Examples include press releases, campus maps, and other information on public websites.<\/li>\n\n\n\n<li><strong>Regulated Data<\/strong>. This is information that is protected or controlled by statutes, regulations, institutional polices or contractual language. Examples include student record information (protected by\u00a0<a href=\"https:\/\/studentprivacy.ed.gov\/ferpa\">FERPA<\/a>), credit card numbers (regulated by\u00a0<a href=\"https:\/\/www.pcisecuritystandards.org\/pci_security\/\">PCI-DSS<\/a>), or financial records.<\/li>\n\n\n\n<li><strong>Confidential Data<\/strong>. This is information that must be guarded due to proprietary, ethical or privacy considerations. &nbsp;Examples include Alumni information, donor information, or research data.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting<\/h2>\n\n\n\n<p>Servers found on campus which are maintained by OT have multiple layers of protection from being within a secure campus network. &nbsp;With the growing use of cloud data storage&nbsp;we need to keep in mind that data that is considered&nbsp;<em>regulated<\/em>&nbsp;should not be kept in cloud storage, with the exception of FERPA data in Luther Seminary&#8217;s Google Drive.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FERPA data may be stored in Luther Seminary&#8217;s Google Drive.<\/li>\n\n\n\n<li>Social Security Numbers and Credit Card Numbers should&nbsp;never be stored in cloud storage or transmitted in email.<\/li>\n<\/ul>\n\n\n\n<p>Additional activities relating to GLBA and FTC Safeguards compliance are maintained on internal documentation.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Utilizing <a href=\"https:\/\/sites.augsburg.edu\/it\/mfa-faq\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication with Duo<\/a>, user accounts have an added layer of protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Educating<\/h2>\n\n\n\n<p>Faculty and staff are the best defense against preventing a loss of data. They are also the most frequent targets through email phishing scams. People are no longer trying to break into organizations. They are trying to trick people into handing over their keys (i.e. their password). To learn more about phishing and cybersecurity, please read these previous blog posts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/inside.augsburg.edu\/it\/2013\/02\/13\/phishing-emails-that-try-to-get-your-password\/\">What Is Phishing?<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/inside.augsburg.edu\/it\/2013\/02\/25\/phishing-when-at-first-you-succeed-try-and-try-again\/\">When At First You Succeed, Try and Try Again.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.luthersem.edu\/2019\/10\/03\/cybersecurity-month-week-1-phishing\/\">Cybersecurity month, week 1 : phishing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.luthersem.edu\/2019\/10\/09\/cybersecurity-month-week-2-online-safety-tips\/\">Cybersecurity month, week 2, online safety tips<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/inside.luthersem.edu\/2019\/10\/23\/cybersecurity-month-week-4-preventing-identity-theft\/\">Cybersecurity month, week 4, preventing identity theft<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Working Remotely<\/h3>\n\n\n\n<p>Working remotely introduces more flexibility but also opens us to more risk being further from our colleagues. The need to verify unusual requests directly with the person via phone or video conferencing is increased.<\/p>\n\n\n\n<p>Here are some general tips sheets for remote work information security from security experts.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a rel=\"noreferrer noopener\" aria-label=\"Social Engineering Red Flags (opens in a new tab)\" href=\"http:\/\/inside.luthersem.edu\/technology\/wp-content\/uploads\/sites\/10\/2020\/04\/SocialEngineeringRedFlags.pdf\" target=\"_blank\">Social Engineering Red Flags<\/a> &#8211; what to watch out for in phishing emails and other scams<\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" aria-label=\"Tips for working from home (opens in a new tab)\" href=\"http:\/\/inside.luthersem.edu\/technology\/wp-content\/uploads\/sites\/10\/2020\/04\/DynamicCampus_Infographic_CyberSecurity_Print_External.pdf\" target=\"_blank\">Tips for working from home<\/a> &#8211; not all apply to our systems but most are helpful<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Training<\/h3>\n\n\n\n<p>To ensure all faculty and staff are aware of effective practices Luther Seminary has subscribed to Data Security training from Curricula. &nbsp;Training faculty and staff ensures we remain compliant with the Title IV financial aid requirements for protecting student information.&nbsp; Training shall be sent to employees in twice a calendar year along with follow-up phishing simulations. <a href=\"https:\/\/mycurricula.com\/auth\/saml\/upghj47kcz\" target=\"_blank\" rel=\"noreferrer noopener\">Employees can login here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Program Coordinator<\/h2>\n\n\n\n<p>This information security program is coordinated by Scott Krajewski, CIO, <a href=\"mailto:skrajewski001@luthersem.edu\" class=\"autohyperlink\">skrajewski001@luthersem.edu<\/a>.<\/p>\n\n\n\n<p><em>Updated<\/em>: 12\/27\/2022<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The protection of the private information of Luther Seminary community members is of critical importance to the Office of Technology (OT). &nbsp;The three components below describe in broad terms how the institution is protecting that private information. &nbsp;In addition, this program ensures compliance with Title IV financial aid requirements for protecting student financial aid information. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-64","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/pages\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":22,"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/pages\/64\/revisions"}],"predecessor-version":[{"id":459,"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/pages\/64\/revisions\/459"}],"wp:attachment":[{"href":"https:\/\/inside.luthersem.edu\/technology\/wp-json\/wp\/v2\/media?parent=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}