Protection and Use of Faculty, Staff, and Student Identifiers Protocol

Introduction

This protocol, its accompanying standards and procedures, and a glossary of technical and legal terms, are designed to offer a set of principles for evaluating the relative sensitivity of personal identifiers, rules and practices designed to minimize and mitigate the threats of exposure or loss of business records containing identifying information, and support for the campus Internal Controls initiative.
Faculty and staff at the University at Albany are required to collect and use a wide variety of information, in both paper as well as electronic formats. Grades, research data, application submissions, health records, and financial transactions are just some of the types of business records we utilize in the course of performing our work.

As criminal fraud incidents involving stolen or lost information have proliferated, states and the federal government have imposed increasingly stringent requirements on businesses and government entities to ensure that adequate protections are applied to collections of business records containing sensitive, personal information.
The Family Education Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HIPAA) are two examples of federal legislation that require specific levels of protection and authorize penalties for failure to comply with those requirements.

At least two statutes in New York State, the Information Security Breach and Notification law and the Social Security Protection law, impose severe penalties for the mishandling and misuse of social security numbers. Provisions in the state’s Labor Law and Public Officers Law also impose restrictions on the use of social security account numbers by state entities.

Because of the possible sanctions the University could suffer resulting from the loss or exposure of regulated information, and the increasing threats to that information posed by cybercrime and emerging technologies (e.g., cloud services, social networking sites), it is vitally important that University faculty and staff understand what business records they need to protect, and how best to protect them.

ITS Protocol

Pursuant to the University at Albany Information Security Policy, this protocol is established as part of the Identity Management Security Domain*.  [An asterisk indicates that the term is defined in the attached glossary.]

Security Domain

Identity Management---A comprehensive and unified approach to managing the identities of persons and processes issued by the University for the purpose of granting and controlling access to campus information resources. This includes exercising due care in the areas of identity assurance, issuance, authentication, authorization, revocation, and recovery of identity elements (NetIDs, tokens, etc.).

Objective

1. Broaden awareness about the need to maintain confidentiality and privacy of unique identifiers used at the University.
2. Reduce reliance on and use of SSNs for identification purposes.
3. Establish consistent University-wide and divisional protection and use policies and practices for institutional identifiers.
4. Increase student and employee confidence surrounding the handling of their personal identifiers, including SSNs.

Policy Statement

The University at Albany is committed to ensuring the privacy and proper handling of confidential information it collects and maintains on faculty, staff, and students, including the Social Security Number (SSN) which is required for state and federal government reporting purposes. It is the policy of the University at Albany to protect the privacy of SSNs and to place appropriate limitations on its use throughout the admission, financial aid, billing, registration, and HR processes. These limitations apply equally to University information systems and the information systems of contracted third parties.

Likewise, the University creates, assigns, and uses unique identifiers to accurately distinguish and track faculty, students, and staff through a myriad of business, research, academic, and health care processes.  FERPA rules require institutions to maintain appropriate levels of privacy protection for these institutional forms of identification due to their close association with educational records. Sensitive information related to employment and health records is linked to them, as well.

This protocol outlines the acceptable use of SSNs and all other institutional identifiers, limiting their use to business purposes only and establishing procedures to assure that University employees are aware of and comply with all applicable laws and regulations.

Scope

This is a University-wide protocol affecting all business and academic units and affiliate entities that rely on University institutional identifiers for their operations.

Guiding Principles

1. Use of unique identifiers should progress from the least confidential required to the most confidential. For example, if a NetID or AlbanyID is sufficient to uniquely establish an identity, these identifiers should be used instead of SSNs. Generally speaking, the least confidential identifier is a name; the most confidential identifier is the SSN with the name.
2. The number of unique identifiers required should be determined by the minimum needed to effect the transaction. If the Albany ID is sufficient to positively identify someone, there is no need to add additional identifiers to the record set unless they are essential to the transaction.
3. Excluding systems of record, identifiers should not be retained beyond the period defined by document retention requirements, or if otherwise unspecified, the time needed to complete the transaction requiring their use.

Roles and Responsibilities

1. Regulatory Compliance. All staff is expected to know, understand, and comply with the regulations governing the collection, distribution, storage, and disposal or destruction of information they work within the course of performing their duties.

2. Supervisory Personnel. In addition to the above general compliance requirement, supervisory personnel have the following responsibilities:

  • Ensure that their staff understand and adhere to the statutory or University regulations that govern the use of the unit’s or department’s information.

  • Ensure compliance and adherence on the part of employees to the protocol’s Standards and Procedures document (See Related Documents for link).

  • Periodically review and update data access permissions and privileges to ensure that staff have appropriate access levels to records. Terminations, transfers, and changes in employee work assignments require a review and adjustment of employee access privileges.

  • Report incidents of abuse of privileges, or unauthorized access to information, to the appropriate authorities upon discovery of such abuse or unauthorized access.

Compliance

Compliance with this protocol and its related standards and procedures will be in accordance with the Compliance section of the University's Information Security Policy as well as any and all applicable laws.

Review

This protocol and all related published documents will be reviewed no less than once every three years.

Related Documents

• Protection_of_Identifiers_Standards_Procedures
Internal Control Vulnerability Assessment (See Factor 10)
• https://www.albany.edu/internalcontrol/links.php

UAlbany Identity and Access Management Policy

SUNY Information Security Guidelines, Part 1: Campus Programs & Preserving Confidentiality, #6608
NYS Labor Law
NYS Public Officers Law
NYS Social Security Number Protection Law
Federal Educational Rights and Privacy Act
Federal Trade Commission Identify Theft Red Flag Rules
Health Insurance Portability and Accountability Act
Gramm Leach Bliley Act
Freedom of Information Law
NYS Information Security Breach & Notification Law
NYS Business Law and Technology Law
NYS Information Security Policy P03-003
SUNY Policies of the Board of Trustees

Updated: February 11, 2013