Skip to Main Content
Menu
Roane State Community CollegeRoane State Community College

Roane State Community College

RSCC Policies & Guidelines
  1. RSCC HomeRSCC Home
  2. About Roane State
  3. RSCC Policies & Guidelines
Move Forward. Don't delay your future! Apply now! Register for online or traditional classes.Move Forward. Don't delay your future! Apply now!. Register for online or traditional classes.
Tennessee Reconnect and Promise. Graduating high school seniors can attend tuition-free. Free tuition for adults.Tennessee Reconnect and Promise. Graduating high school seniors can attend tuition-free. Free tuition for adults.
Online degrees available. Online education gives you flexibility to take classes that fit your schedule.Online degrees available. Online education gives you flexibility to take classes that fit your schedule.

RSCC Policy GA-18-08; Data and Personally Identifiable Information (PII) Security

Roane State Community College
Policy Number: GA-18-08
Subject: Data and Personally Identifiable Information (PII) Security
  1. Purpose
    The purpose of this policy is to establish a standard for managing Personally Identifiable Information (PII) data on college-owned computers or devices that are used to store or transport sensitive or confidential information. In addition, this policy outlines responsibilities for Roane State employees who have access to such information.
  2. Scope
    The scope of this policy includes all college employees, contractors, or consultants with access to PII information.
  3. Definitions
    1. Sensitive Information is defined as any information that provides PII on a Roane State Community College (RSCC) student, faculty, or staff member. PII is information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual. This includes, but is not limited to, information such as social security number, date and place of birth, and mother’s maiden name. Directory information is determined by each intuition and is not considered PII.
    2. Portable Mass Storage Device is defined as any device which is capable of transporting digital files outside the internal storage device of a Roane State computer or network. They include such devices as floppy disks, CD/DVD’s, flash drives, zip drives, or external hard drives.
    3. Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
    4. Data Custodians are institutional designees who are responsible for establishing data management procedures and the assignment of access to the data for which they are responsible. Representatives will be designated from the flowing functional area as Data Custodians.
    5. Directory Information is that information which constitutes a basic profile based on information contained within student education records that generally is not considered harmful or an invasion of privacy if released. Directory information at RSCC includes:
      1. Business Office
      2. Student Records
      3. Financial Aid
      4. Payroll
      5. Human Resources
      6. Student Name
      7. Address
      8. Email address
      9. Telephone Listing
      10. Date of Birth
      11. Participation in officially recognized activities and sports
      12. Weight and Height of athletic team members
      13. Dates of attendance
      14. Enrollment Status - Part-time, Full-time
      15. Degree and awards received
      16. Major field of study
      17. Most recent previous educational agency or institution
  4. Procedures
    1. General
      Access to data residing in administrative systems and applications at RSCC is to be granted only to those individuals who must, in the course of exercising their responsibilities, use the specific information. Data custodians are responsible for granting access to the information.

      The copying, downloading, FTP transfer, or otherwise duplicating PII data on a computer, website, floppy diskette, CD/DVD, tape, USB device, or other such mobile storage device for purposes other than backup by authorized personnel is prohibited unless granted written permission by the Assistant Vice President, Information Technology.
    2. Control of Sensitive Information
      Under no circumstance should sensitive or confidential information be transferred to or stored on any personally-owned laptops, removable media, or home computers. While access to Banner is permissible from personally owned computers, no PII data may be downloaded or stored on such devices.

      One may access administrative systems and work with sensitive or confidential information from college-owned computing devices, but may not make a copy of that information and store it locally on the device. Any file containing personally identifiable information must be stored on the individual’s “U” drive on the network.

      Unsecure laptops or removable storage devices will not be used to transport or store sensitive information. Should a requirement exist for sensitive or confidential information to be stored on a laptop or removable media, the device must be encrypted and be physically secured when unattended. Unless written permission, as outlined above, has been granted, removable media such as USB drives or optical disks (e.g., CD-ROM or DVD-ROM) should not be used to transport sensitive or confidential information.

      Laptop users are responsible for securing laptops at all times, but especially when traveling. (See Security of Laptop below.)
    3. Email Transfer of PII
      PII should not be transmitted electronically (i.e., emailed from any systems such as Outlook, BDMS, etc. or by any other electronic transmission methods) unless encrypted. Transmittal of information containing the Campus Wide ID (CWID) is permitted. (However, it is recognized that even this practice is being debated and may change in the future.)
    4. Encryption
      Laptop computers owned by the college and assigned to faculty and staff are to be configured to use hard drive encryption. Contact the Help Desk if you believe your laptop needs to be encrypted.

      Encryption methods used will be dependent on host operating system and whether or not the laptop hardware includes a Trusted Platform Module (TPM).

      Encryption techniques requiring password authentication allowing a host operating system to load will conform to strong password standards See GA-18-09, Strong Password. Access the complete detailed RSCC policy GA-18-09 at www.roanestate.edu/policies/. Check your password strength at Microsoft's Create Strong Passwords.
  5. Security of Laptop

    Campus Offices - Laptops must be secured in a locked office when unattended for an extended length of time or left overnight.

    Out of Office - When laptops are taken out of the office, the laptop must be kept under positive control of the owner. It should be in hand, in sight, or locked in a secure location at all times.
  6. Scans
    Roane State will conduct annual vulnerability scans of its outward facing firewall and annual scans of its internal credit card payment network in accordance with the Payment Card Industry Data Security Standards (PCI-DSS). All scans will be performed by an Approved Scanning Vendor or ASV. Any discrepancies will be corrected and a follow-up scan performed until the system is compliant. Scans will also be performed after any major changes in the network.

    Wireless networks will be monitored for rogue access points, unauthorized WLAN cards or other unauthorized devices connected to Roane State’s network.
  7. Training
    For employees that are required to access PII from the Administrative System, Roane State Information Technology Division will provide training information annually on the proper handling and safeguarding of PII.
  8. Enforcement
    Any employee found to have violated this policy may be subject to disciplinary action.

Revision History: 03/05/2014, 01/25/2018, 07/22/2019
TBR Policy Reference: 1.08.04.00
Revision Date Effective: 07/22/2019
Revision Approval By: Christopher L. Whaley, President
Original Date Effective: 02/01/2013
Original Approval By: Christopher L. Whaley, President
Office Responsible: Vice President for Business & Finance
Reviewed: 07/07/2019

Connect with us

Twitter / XFacebookInstagramThreadsYoutube
© Roane State Community College

Roane State Community College does not discriminate on the basis of race, color, religion, creed, ethnicity or national origin, sex, disability, age, status as protected veteran or any other class protected by Federal or State laws and regulation and by Tennessee board of Regents policies with respect to employment, programs, and activities.​​​​​​​ View full non-discrimination policy.

Tennessee's Community Colleges

Report Fraud, Waste and Abuse

Digital Millennium Copyright Act of 1998