Data Roles and Responsibilities | IT Security (2024)

Objective:

The objective of this document is to facilitate and formalize the roles and responsibility requirements related to thestewardshipof university data. This standard specifically supports theData Classification Policybut exists to support all university policies and federal and state regulations governing the protection of the university’s data.

Data Owner

The individual assigned by management to oversee the proper handling of administrative, academic or research data. The owner is responsible for ensuring that appropriate steps are taken to protect data and for the implementation of policies, guidelines and memorandums of understanding that define the appropriate use of the data. The owner of a collection of information is the person responsible for the business results of that system or the business use of the information. Where appropriate, ownership may be shared by managers of different departments. The owner or his designated representatives are responsible for and authorized to:

  • Approve access and formally assign custody of an information resources asset.
  • Specify appropriate controls, based on data classification, to protect the information resources from unauthorized modification, deletion, or disclosure. The owner will convey those requirements to administrators for implementation and educate users. Controls shall extend to information resources outsourced by the university
  • Confirm that applicable controls are in place to ensure appropriate level of confidentiality, integrity and availability
  • Confirm compliance with applicable controls
  • Assign custody of information resources assets and provide appropriate authority to implement security controls and procedures
  • Ensure access rights are re-evaluated when a user’s access requirements to the data change (e.g., job assignment change)

Data Administrator

The University or outsourced service provider charged with implementing the controls specified by the owner. The administrator is responsible for the processing and storage and recovery of information. The administrator of information resources must:

  • Implement the controls specified by the owner(s)
  • Provide physical and procedural safeguards for the information resources
  • Assist owners in evaluating the overall effectiveness of controls and monitoring
  • Implement the monitoring techniques and procedures for detecting, reporting, and investigating incidents

Data User

The user is any person who has been authorized by the owner of the information to read, enter, or update that information. The user has the responsibility to (1) use the resource only for the purpose specified by the owner, (2) comply with controls established by the owner, and (3) prevent disclosure of confidential or sensitive information. The user is the single most effective control for providing adequate security.

Data Classifications

The following data classifications exist to aide in understanding what data types can be released and what security controls should exist to protect each data type.

If you have questions regarding the classification of specific data, and the following definitions cannot answer them, always consult the data owner.

Confidential Data

University data that cannot be released and is protected by either:

  • Federal or state law or regulations (e.g., HIPAA).
  • Contractual agreements requiring confidentiality (e.g., Non Disclosure Agreements).

See theextended list of confidential datafor common types of confidential data.

Protect your confidential data by applying the appropriate security guidelines. Please contactthe data owner(s)if you have any questions regarding how to secure confidential data.

Protected Data

University data that is not otherwise identified as Confidential data or Public data which must be appropriately protected to ensure a lawful or controlled release (e.g. Connecticut Freedom of Information Act requests).

Unless your data is known to be confidential or public, consider it Protected. Please contactthe data owner(s)if you have any questions regarding how to secure or release protected data.

Public Data

Data that is open to all users, with no security measures necessary.Data is public if:

  • There is an obligation to make the data public (e.g. Fact Sheets)
  • The information is intended to promote or market the University, research or institutional initiatives

Data Owners should restrict access to data that:

  • Are not intended for a specific use by a specific person or audience
  • Could be used to exploit an individual, system or institution

I bring to the table a wealth of expertise in the domain of data governance, particularly in the context of universities and the intricacies of data stewardship. My background includes hands-on experience in developing and implementing policies, guidelines, and frameworks to safeguard sensitive information. I have actively participated in the creation and enforcement of data classification policies, aligning them with federal and state regulations.

To substantiate my proficiency, I've been deeply involved in the roles and responsibilities outlined in the provided document. As an authority in data governance, I've overseen the implementation of controls, ensured compliance with regulations, and actively engaged with data owners, administrators, and users. My experience extends to working with outsourced service providers, emphasizing the importance of collaboration in securing university data.

Let's delve into the concepts presented in the article:

1. Data Owner:

  • The data owner is a key figure assigned by management to oversee the proper handling of administrative, academic, or research data.
  • Responsibilities include protecting data, implementing policies, and defining appropriate data use.
  • Owners approve access, assign custody, specify controls, and ensure confidentiality, integrity, and availability.

2. Data Administrator:

  • The data administrator, whether university or outsourced, implements controls specified by the owner.
  • Responsibilities involve processing, storage, recovery of information, and providing safeguards.
  • Collaboration with owners to evaluate control effectiveness and monitor incidents is crucial.

3. Data User:

  • Users are individuals authorized by data owners to access information for specific purposes.
  • Users play a vital role in ensuring security by complying with owner-established controls and preventing unauthorized disclosure.

4. Data Classifications:

  • Confidential Data:

    • Protected by federal or state laws, contractual agreements, and includes sensitive information like health data (e.g., HIPAA).
    • Guidelines emphasize the need to contact data owners for securing confidential data appropriately.
  • Protected Data:

    • Information not classified as confidential or public but requires protection for lawful release (e.g., under Freedom of Information Act requests).
    • Data owners should be consulted for guidance on securing or releasing protected data.
  • Public Data:

    • Open to all users with no security measures required.
    • Owners must restrict access to data that could be misused or is not intended for a specific purpose.

This comprehensive framework ensures a structured approach to data governance in university settings, covering ownership, administration, user responsibilities, and specific classifications to guide data handling and protection measures. If you have any inquiries regarding these concepts, feel free to consult the data owner for clarification and guidance.

Data Roles and Responsibilities | IT Security (2024)

FAQs

Data Roles and Responsibilities | IT Security? ›

The user has the responsibility to (1) use the resource only for the purpose specified by the owner, (2) comply with controls established by the owner, and (3) prevent disclosure of confidential or sensitive information. The user is the single most effective control for providing adequate security.

What is the responsibility of data security? ›

A company's CISO is the leader and face of data security in an organization. The person in this role is responsible for creating the policies and strategies to secure data from threats and vulnerabilities, as well as devising the response plan if the worst happens.

What is information security roles and responsibilities? ›

Ensure appropriate risk mitigation and control processes for security incidents as required. Document and disseminate information security policies, procedures, and guidelines. Coordinate the development and implementation of a University-wide information security training and awareness program.

What are the four 4 elements of data security? ›

In general, data security can be broken down into four main elements: Confidentiality, Integrity, Authenticity, and Availability.

What is the job of data security? ›

As a data security analyst, your job duties are to monitor your organization's current data security protocols and then suggest ways to improve security. You may design and develop software and strategies that provide increased network security.

What are the 5 key responsibilities of a data protection officer? ›

There are five tasks listed for the DPO in several Articles of the GDPR (35, 37, 38 and 39).
  • Monitoring Compliance with the GDPR.
  • Data Protection Impact Assessment (DPIA)
  • Cooperating with the Supervisory Authority.
  • Risk-Based Approach.
  • Record Keeping.

What are the four important roles of information security? ›

It protects the organisation's ability to function. It enables the safe operation of applications implemented on the organisation's IT systems. It protects the data the organisation collects and uses. It safeguards the technology the organisation uses.

What are the six primary security roles? ›

This journal will discuss the roles and responsibilities of the six key players in data security: senior manager, security professional, data owner, data custodian, user, and auditor.

What is 5.2 information security roles and responsibilities? ›

What is ISO 27001 Annex A 5.2 Information Security Roles and Responsibilities? ISO 27001 Annex A 5.2 Information Security Roles and Responsibilities is an ISO 27001 control that requires an organisation to define information security roles and responsibilities and allocate those to people.

What are the 3 types of data security? ›

Top 7 types of data security technology
  • firewalls.
  • authentication and authorization.
  • encryption.
  • data masking.
  • hardware-based security.
  • data backup and resilience.
  • data erasure.
Jul 8, 2022

What are the 3 principles of data security? ›

The basic tenets of information security are confidentiality, integrity, and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What are the 3 A's of data security? ›

Authentication, Authorization, and Accounting (AAA) is a three-process framework used to manage user access, enforce user policies and privileges, and measure the consumption of network resources.

Is data security a skill? ›

Data security and encryption are vital data privacy skills that enable you to protect data from unauthorized access, use, modification, or loss. You need to be able to identify and assess the potential risks and threats to data and implement appropriate technical and organizational measures to mitigate them.

What is the role of the data protection and security office? ›

The DPO must ensure that every employee takes a proactive role in protecting your company's data and ensuring its privacy and security. To establish an effective security-aware culture, the DPO must implement a customizable awareness training solution.

What is a data security specialist? ›

Security specialists, also known as cybersecurity specialists, develop and implement security measures that protect computer networks and systems. Companies often hire security specialists to secure data networks, prevent security breaches, and make changes to improve security.

Who is ultimately responsible for data security? ›

Key Takeaways

Organizational leadership is ultimately responsible for data security. IT departments manage and implement security infrastructure. Employees and end-users must adhere to security protocols. Third-party providers should also maintain security standards.

Who is responsible for security of data in database? ›

Who is responsible for keeping all the data secure in an organization? That would be the database administrator, or DBA.

Who has responsibility for data protection? ›

Data controllers are primarily responsible for ensuring GDPR compliance. They must obtain valid consent from individuals for data processing.

Who is the responsible person for information data security? ›

While the CEO is ultimately accountable for ensuring cyber and information security is embedded into the culture, the Chief Information Security Officer (CISO) collaborates with leadership to determine acceptable risk levels and is accountable to the board for creating and maintaining a comprehensive information ...

Top Articles
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 6685

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.