PURPOSE
The University of Louisiana at Lafayette ("University" or "UL-Lafayette") has a strong interest in the integrity, confidentiality, and availability of University information and systems. Access controls protect University information by only allowing authorized people to access systems. Following this standard minimizes risk to the University resulting from unauthorized use of resources. Access control at the University happens through procedures and standards that follow university policies. The University has a layered approach to securing information systems. Access controls cover many topics, including physical controls for IT devices and technical and other controls for the information on them.
Access controls for University information systems must balance making it difficult for unauthorized people to access our systems and easy for authorized people to use these systems. Procedures supporting this policy should consider both business and security needs for all methods of access to each program or system. This standard is complementary to other University Policies and IT Standards and does not supersede them.
SCOPE
This standard applies to all members of the University of Louisiana at Lafayette main campus community, including staff, faculty, students, and approved external users, having authorized access to any University-owned computer system. People and units at the University responsible for managing IT systems or University data must follow this standard.
DEFINITIONS
-
Access: The ability and means to communicate with or otherwise use a system, including using system resources to handle information, gaining knowledge of information held by the system, and controlling parts of the system and its functions.
-
Access Controls: Mechanisms that decide who may have an account on University Information Technology systems, what they may do with their account, and how they access those systems. Access controls are designed to protect both individual and University information.
-
Authentication: Verifying the identity of a user, process, or device, often performed before allowing access to resources in an information system.
-
Authorization: Access privileges given to a user, program, or process, or the act of granting those privileges. Privileges are no longer "authorized" when a user leaves a role if that role was the basis for their authorization (e.g., leaving a job or changing to a new one with different responsibilities).
-
Mission Critical: A system so critical to the mission of a University business unit that any incident requires immediate response.
-
Multi-User System: A server or other system that provides access or services to more than one user at the same time, or a system that multiple people rely upon to be reliably available for use.
-
Privileged: System or Application Administrators and users with elevated data-access privileges (beyond access to their own data) are considered "privileged" users. User accounts with higher privileges than a standard user of an application or operating system or those with access to mission critical systems or information other than their own are considered "privileged" accounts. This includes administrators of servers or multi-user applications, privileged access to applications, or access with tools like "sudo". A user who can set privilege levels for other users is an administrator and therefore "privileged". NOTE: for purposes of this Standard, common use of "local-admin" privileges on individual devices by their assigned users is not "privileged".
-
Role: A group attribute that ties membership to function. When someone assumes a role, they are given certain rights that belong to that role. When they leave the role, those rights are removed. The rights given match the functions needed to perform expected tasks.
-
User: Anyone with access to University information technology systems or services.
-
User Manager: Any University administrator, faculty member, or staff member who supervises people or who has University administrative responsibilities.
STANDARDS
Access Rights Management
Access to University information assets must be authorized and managed securely in compliance with appropriate industry practice and with applicable legal and regulatory requirements (e.g., Health Insurance Portability and Accountability Act, Family Educational Rights and Privacy Act, Open Records Act of Tennessee, Gramm Leach Bliley Act, and identity theft laws). University information assets include data, hardware, software technologies, and the infrastructure used to process, transmit, and store information.
Access Controls:
-
Access control mechanisms may include user IDs, access control lists, constrained user interfaces, encryption, port protection devices, secure gateways/firewalls, and host-based authentication.
Access Review:
Access Termination:
-
Verify annually, in consultation with the applicable Vice President, Dean, or Chair, that individuals with access control devices remain employed by the University and that their access privileges are current. Routinely verify that access privileges for contractors, guests, vendors, or volunteers are still justified for University purposes. If access is no longer warranted, recover the device(s) and deactivate the access. If the individual has separated from the University, within the week of separation, the supervisor or Chair should notify the applicable controllers to deactivate the access control device.
-
Access privileges should be controlled based on identity (user ID), role or function, physical or logical locations, time of day/week/month, transaction-based access, and access modes such as read, write, execute, delete, create, and/or search.
-
The person who manages access for a system needs to approve changes to that access, including adding or removing access methods. Every change needs a valid business justification. For example, access to an administrative system may require approval by a person's supervisor, an access request coordinator, and the Data Steward or another person with authority to grant access to the specific data.
-
The unit that manages the technical aspects or the security of a system approves authorized accounts, including creating, removing, or changing authorized accounts, and granting or changing access to protected data and network resources.
-
Emergency Access Control System Administrators serve as designated individuals with authority to make decisions that override the access system, such as the Chief of Police, CIO, or Director of University Computing Support Services.
Remote Access
-
The University defines standards for connecting to the University's network from any host to minimize potential exposure from unauthorized use of resources, including loss of sensitive data, intellectual property, damage to public image, or critical internal systems.
Physical Access
Managing Access Rights
If a system has University data and more than one person uses it, it must have a process for authorizing access.
-
The device holder will bring the device to the authorized partition controller to assign access permission. The controller shall activate access permissions that have been authorized by the department(s) that manages the space, using the campus system software. The controller shall retain a record of the authorization.
-
For every device issued, including keys, fobs, cards, etc., the controller shall notify the device holder of his/her responsibilities and shall retain records that document the device number, name of recipient, date of issue, access permissions given, date of return or loss, and any dates upon which access permissions were suspended or deactivated.
-
Maintain an inventory of and store unassigned department access control devices in a secure location with restricted access. This primarily applies to keys, fobs, and contractor access devices. Document and retain records of the destruction of any defective devices.
-
Departments should consult with Human Resources regarding an individual's employment status and/or to reissue new access control devices associated with the new work assignment. If an employee is on long-term leave, investigatory leave, or when absence from the campus is for an extended period of time, HR must notify the applicable department manager.
-
Issuance and recovery of temporary access control devices shall be in accordance with this policy and procedure. Access control device expirations shall correspond to the University's needs for individual's access privileges, as determined by the department issuing the access control device but may not exceed 12 months without Administrator approval.
- All individuals issued a University access control device are required to:
- Secure and be responsible for the access control device issued to him/her. Access control devices shall be used ONLY by the individual to whom the access control device was assigned. Access control devices MAY NOT be loaned to others.
- Return excess access control devices to the appropriate manager. Only one access control device per access control system will be assigned to each individual. Individuals who have been assigned more than one device per system may retain a second device if approved by their manager for their area and following execution of an agreement to pay cost of replacement if not returned prior to end of employment to be deducted from the user's final paycheck or other final payment from the University.
- Return the access control device to their manager upon separation from the applicable department. Access control devices are considered University property and individuals may be held responsible for failure to return them at the end of employment.
- Report the loss or theft of all access control devices to your manager AND the University Police Department within 24 hours of the discovery of the theft or loss. Individuals with access control devices enabled with other functions will also need to notify each service provider to deactivate the functions.
- Do NOT prop doors open or leave them unsecured during hours when the facility is normally closed to the public. High risk & security doors should remain locked at all times.
-
Departments with restricted/high risk areas that require additional access controls, such as specialized labs, shall develop written procedures for controlling access to their restricted areas, in consultation with, Campus Access Control System Administrators, and other university officials as necessary. The procedures shall include:
Identification and Authentication
The University requires each person to have a unique ID to authenticate with. Everyone who uses a system must follow the IT policies related to User IDs, especially the rules intended to keep IDs safe and used only by the people they are assigned to. People who handle this work must enforce those policy requirements by holding Users accountable if they do not follow the rules.
-
All passwords used to access information assets must conform to certain requirements relating to password composition, length, expiration, and confidentiality.
Access Audit and Review
Any units or persons responsible for access-controlled systems at the University must create, document, and follow processes to regularly audit system account access. People who manage access control for a system must review and approve all access modifications as well.
-
Audit account creation, modification, enabling, disabling, and removal actions, and notify the system owner.
Use Of External Information Systems
The University establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to:
This control establishes the process of securing Analysis Services that occur at multiple levels. Each instance of Analysis Services and its data sources must be secure to make sure that only authorized users have read or read/write permissions to selected dimensions, mining models, and data sources, and to prevent unauthorized users from maliciously compromising sensitive business information. The University employs data mining prevention and detection techniques to adequately detect and protect against data mining.
Roles and Responsibilities Regarding Enforcement
Each University department/unit is responsible for implementing, reviewing, and monitoring internal policies, practices, etc. to assure compliance with this standard.
The Office of the Chief Information Officer is responsible for enforcing this standard.
Non-Compliance and Exceptions
Non-compliance with these standards may incur the same types of disciplinary measures and consequences as violations of other University policies, including progressive discipline up to and including termination of employment, or, in the cases where students are involved, reporting of a Student Code of Conduct violation.
Contractors, vendors, and others who do not adhere to this standard may face termination of their business relationships with the University.
Exceptions to this standard may be submitted in writing to the UL Lafayette IT Security Officer who will assess the risk and make a recommendation to the UL Lafayette Chief Information Officer. Written approval must be attained from UL IT prior to utilizing any exceptions. Exceptions must be reviewed for reauthorization on no less than an annual basis.
Applicable UL Lafayette IT Policies:
Related UL Lafayette IT Policies and/or Standards: Account Standards ULIT-S001
Contact Information
RESPONSIBLE OFFICE: Information Technology
APPROVAL AUTHORITY: Gene Fields, Chief Information Officer
Important Dates
28 May 2025 Matthew E Delcambre (Initial Draft Submitted)