Skip to page content

Information Security Plan

Introduction

In today's digital age, safeguarding sensitive information is paramount. Yosemite Community College District (YCCD) is committed to protecting the personal and financial information of its students and employees. This Information Security Plan outlines the measures YCCD is implementing to comply with the Gramm-Leach-Bliley Act (GLBA) and ensure the security of sensitive data.
 

Gramm-Leach-Bliley Act (GLBA) Overview

The Gramm-Leach-Bliley Act (GLBA), enacted in 1999, mandates that financial institutions, including higher education institutions, protect the privacy and security of customer information. The GLBA comprises three main components: the Financial Privacy Rule, the Safeguards Rule, and the Pretexting Provisions.1 These rules require institutions to explain their information-sharing practices, develop a comprehensive information security program, and protect against unauthorized access to sensitive data.2
 

How GLBA Relates to YCCD

As a higher education institution, YCCD collects, stores, and processes a significant amount of personally identifiable information (PII) and nonpublic personal information (NPI) related to students and employees. Compliance with the GLBA ensures that YCCD maintains the confidentiality, integrity, and availability of this sensitive information.3
 

Which GLBA Provisions Apply and Do Not Apply to YCCD

The GLBA provisions that apply to YCCD include the Safeguards Rule, which requires the implementation of an information security program, and the Financial Privacy Rule, which mandates transparency in information-sharing practices.4 The Pretexting Provisions, which protect against social engineering attacks, also apply. However, certain financial-specific provisions may not be directly applicable to YCCD.
 

Security Plan

Overview

YCCD's Information Security Plan is designed to meet the requirements of the GLBA and protect sensitive information from unauthorized access, use, or disclosure. The plan includes specific measures and protocols to ensure compliance and enhance the overall security posture of the institution.
 

Qualified Individual

The Director of Information Security is designated as the Qualified Individual responsible for overseeing, implementing, and enforcing the information security program.
 

Reporting

The Director of Information Security will submit a written report to the Board of Trustees at least annually each fiscal year. This report will detail the status of the information security program, identified risks, and mitigation efforts.5
 

Risk Assessment

Each department within Information Technology will conduct a written risk assessment, with assistance from Information Security, twice a year. These risks will be evaluated and compiled into a final risk assessment for the district as a whole. The final risk assessment will include:
  • How YCCD will categorize and evaluate risks it faces
  • The criteria for assessing the confidentiality, integrity, and availability of customer information in information systems
  • The adequacy of existing controls as they relate to the risks identified
  • How identified risks will be mitigated or accepted based on the risk assessment
  • How the information security program will address the risks
The risk assessment will cover risks related to:
  • Customer, student, or employee PII or NPI
  • Information systems, including software and hardware used in the storage, access, and transmission of sensitive information
  • Employee behavior and security awareness, with additional emphasis on those encountering sensitive information
  • Any in-house developed code

Monitoring and Testing

  • Information Security will run a penetration test at least annually using either in-house staff or by contracting with a third-party cybersecurity vendor. Additionally, comprehensive vulnerability assessments will be conducted at least twice a year and after any significant changes in any system.

Policies and Procedures

  • All permanent, temporary, and contract staff will be required to undergo information security awareness training at least every fiscal year.
  • Users with access to sensitive data will undergo additional training for handling confidential information at least once every fiscal year.
  • Users with administrative access in any system will complete specialized cybersecurity training at least once every fiscal year.
  • Information security/cybersecurity training will be required before access to related systems/functions is granted.

Service Providers and Contracts

  • All vendors with any level of access to YCCD systems will undergo a risk assessment to determine their risk level before formal selection.
  • Vendors will undergo reevaluation annually to monitor changes in their risk level.
  • YCCD will ensure that contracts with covered vendors include provisions sufficiently covering data security.

Evaluation and Revision of the Information Security Program

  • The information security program will undergo review and adjustment at least once every fiscal year based on information gathered during risk assessments, emerging threats, or industry best practices. By adhering to these guidelines, YCCD demonstrates its commitment to protecting sensitive information and maintaining compliance with the Gramm-Leach-Bliley Act.