Skip to Content

IT Security Program

The College has adopted the policies, models, standards, and guidelines set forth by the Virginia Community College System (VCCS) Information Security Program.  This, along with College-specific supporting documentation, constitutes the College’s Information Technology Security Plan.
 
Governance
VCCS governance considers it essential to communicate its information security requirements throughout the organization to all users in a form that is relevant, accessible, current, and understandable to any reader.  Standards are applicable to all organizations that comprise the Virginia Community College System (VCCS) including the System Office, the Shared Services Center, and all Community Colleges and to all persons directly or indirectly employed by the VCCS including student employees, faculty, adjunct faculty, staff, and contract personnel.
 
Security Controls
The purpose of security controls is to perform the tasks in the management, planning, technical, and operational safeguards and security measures to ensure the College’s confidential and sensitive information is secure, that data remains intact, and that College services remain available to our patrons.  These resources are vulnerable to being rendered unusable or crippled due to sabotage, human error and natural disasters.  To preserve the integrity of information technology resources, all areas of the College must contribute to the appropriate level of protection of these mission critical resources.  The primary areas of focus for security controls which significantly reduce threats are:
  1. Information Security Risk Management
  2. Information Security Management Program
  3. Organization of Information Security
  4. Human Resource Security
  5. Asset Management
  6. Access Control
  7. Cryptography
  8. Physical and Environmental Security
  9. Operations Security
  10. Communications Security
  11. System Acquisition, Development & Maintenance
  12. Supplier Relationships
  13. Information Security Incident Management
  14. Information Security Aspects of Business Continuity Management
  15. Compliance
  16. Cloud Services
Summary
The College constantly works to neutralize, or minimize, all known vulnerabilities identified via the risk assessment of information technology resources and environment.  While conducting business there remains inevitable risks that exist, therefore, it must be recognized that we function in this environment, yet strive to provide services while instituting reasonable protective measures.  The College will determine funding sources during planning to rectify, where applicable, any discrepancies of non-compliance with ISO/IEC 27002:2013(E), as identified from conducting the Business Impact Analysis and the Risk Assessment for Information Technology Infrastructure.

Contact the College Information Security Officer for further information or questions on the college Information Technology Security Plan.
Back to top