The purpose of this policy is to establish and enforce practices for secure data transfer to university systems, thus minimising the risk of information leakage or the compromise of systems. Specifically, this policy deals with the transfer of information between internal systems and servers as well as information that crosses our network border to third party service providers.
This policy applies to all members and partners of Plymouth University who are directly involved in the creation, delivery, support, maintenance of digital information flows to facilitate a personalised experience used for teaching, learning, research or administration of software or services within the enterprise architecture and contributing component architectures.
This policy applies to all systems that contain technology, application and information components throughout the organisation, including hosted or 3rd party platforms, with particular emphasis on public facing, university wide or business critical systems.
It is recognised that systems located within the University and/or its service providers afford day-to-day functionality that the university’s business relies on. These services and software on their own provide functionality, but without reliable and accurate data transferred in a secured manner to ensure its integrity and consistency the effectiveness of the product will be reduced.
The university makes use of services both within and outside of its network perimeter; however the requirements for transferring data should be designed as though it is traversing the perimeter to ensure consistency. Standardisation with secure methodologies, coupled with the removal of any outdated protocols will reduce the risk of data or service compromise.
Secure protocols will always be used in preference over unsecured protocols for data transmission. If no secured protocol is available then a secured tunnelling (IPSec or SSL VPN) technique must be utilised to prevent information being transmitted in plain sight of network users.
When engaging with third party suppliers of service, data transfer between the relevant parties should be conducted with both a secured tunnel serving secured data wherever possible.
The security of data transmission and penetration to detect possible leakage must be tested at regular intervals to ensure satisfactory operation; these tests must be scheduled and communicated with the business in advance to ensure business continuity.
Failure to comply with this policy will lead to the solution architecture being rejected during Enterprise Architecture review, returned for rework, being placed on hold or managed by a waiver to the Enterprise Architecture.
Exceptions to this policy may be granted using the Enterprise Architecture Waiver Process and will be considered on merit as well as alignment with the overall architecture.
This policy is supported by established Enterprise Architecture documents, namely:
- Enterprise Architecture Principles – Principle 8: Data Security
- “Security must be designed into data elements from the beginning; it cannot be added later. Systems, data, and technologies must be protected from unauthorised access and manipulation. Vice Chancellor’s Executive information must be safeguarded against inadvertent or unauthorised alteration, sabotage, disaster, or disclosure.”
- Enterprise Architecture Principles – Principle 9: Data is an Asset
- “Accurate, timely data is critical to accurate, timely decisions. Most corporate assets are carefully managed, and data is no exception. Data is the foundation of our decision-making, so we must also carefully manage data to ensure that we know where it is, can rely upon its accuracy, and can obtain it when and where we need it, in doing so data assets can provide additional value to academic and research endeavors.”
- Enterprise Architecture Principles – Principle 10: Data is Shared
- “Data where applicable, will be available externally to the enterprise. This will afford both rich service provision also the ability to perform research collaboratively with partners.”
- Enterprise Architecture Policy
- “All Plymouth University information management and technology development, modernisation, enhancement, and acquisitions shall conform to the enterprise architecture and comply with applicable Capital Planning and University budgeting processes. “
|Document Security Level:||PUBLIC|
|Document Approvals:||Technical Architecture Group
Enterprise Architecture Practice
Enterprise Architecture Board
|Review Date:||October 2015|