Administrative Data Policy
Responsible Administrative Unit:

Computing, Communications & Information
Technologies


Issued: March, 2014
Policy Contact: Chief Information Officer,


Revised:


1.0 BACKGROUND AND PURPOSE
The Colorado School of Mines’ (“Mines”, “the School”, or “the Institution”) administrative data must
be managed and protected because it is a critical and valuable asset to the school and its mission.
The purpose of this policy and related policies and procedures is to protect the school’s
administrative data from accidental or intentional unauthorized access, damage, alteration or
disclosure, while also preserving the ability of authorized users to access and use administrative
data for appropriate purposes.
2.0 SCOPE
Administrative data covered by this policy include all of the following regardless of the format of the
data or where or how it is housed:
2.1 All data created, collected, maintained, recorded or managed by the institution, its staff,
and agents working on its behalf.
2.2 All data used for planning, managing, operating, controlling, or auditing institutional
functions; especially data used by multiple units of the school; and data used for
institutional reporting.
2.3 All operational data regardless of its source (e.g. extracts or feeds from or to the
institution’s enterprise systems; shadow systems whether independently created by
institutional units or assembled from enterprise systems extracts or both.)
2.4 All data which contains personally identifiable information (PII).
2.5 All data that contains proprietary information and/or trade secrets.
This policy applies to all members of the Mines community whether students, faculty, staff, or their
agents, and all divisions, departments and other units, their agents, and their contractors. To the
extent possible, this policy applies to any person or entity in possession of administrative data
whether affiliated with Mines or not.
3.0 POLICY
All members of the Colorado School of Mines community who work with or use administrative data
in any manner must comply with all federal and state laws, and other applicable school policies,
procedures, standards, contracts and licenses (e.g., FERPA, HIPPA, GLBA, HIGHTEC, PCI,
AICPA, etc.). School employees and their supervisors are responsible for ascertaining,
understanding, and complying with all laws, rules, policies, standards, contracts and licenses
which apply to their own and their subordinates’ specific uses of administrative data.
4.0 OWNERSHIP, ACCESS AND USER RESPONSIBILITIES
Access and use of administrative data is governed by data type. Administrative data falls into three
categories as defined in the Data Classifications and Roles Definitions document. Many positions
on campus have specific responsibilities based on their functional role for handling data, also
defined in the Data Classifications and Roles Definitions document. All data must be treated with
care/respect regardless of its defined type.

P a g e | 1 of 3




Administrative Data Policy
Responsible Administrative Unit:

Computing, Communications & Information
Technologies


Issued: March, 2014
Policy Contact: Chief Information Officer,


Revised:


4.1 Access
4.1.1 Access to All Data is granted solely to fulfill the legitimate business need(s)
documented for a position.
4.1.2 Access to All Data must be approved by both the individual’s department head and
the System Owner.
4.2 Use
4.2.1 All data are used by authorized individuals only as required to conduct the
legitimate business of the School as assigned to their position. All Data may not be
accessed, used, disclosed, modified, or deleted for personal gain or curiosity or for
another’s personal gain or curiosity.
4.2.2 All Data may not be shared with other School employees or anyone else, unless
those persons have authorization to view the data to conduct the legitimate
Business of the School.
4.2.3 All Data may only be released or disclosed outside of the Institution by an
authorized Certifying Employee.

4.3 Public Data
Data on web sites intended for the general public do not require authorization by a data
steward or certifying authority as long as their content does not imply an official statement
or position of the school.

4.4 Restricted and Confidential data
Data should not be stored or copied to local devices on desktops or mobile devices such as
laptops or usb keys. Although it is recognized that exceptions to this do exist, any data
stored on mobile devices must be encrypted according to the Executive Directive titled
Mandatory Use of Encryption Software for Mobile Devices”.

4.5 Disclosure
4.5.1 Restricted Data
Users and Data custodians are authorized to disclose these data as directed by
data stewards

4.5.2 Confidential data
Only the Data Steward is authorized to disclose these data



6.0
SYSTEM AND SECURITY CONSIDERATIONS
Computers and other devices used with administrative data must comply with all requirements
detailed in the Security Practices and Guidelines document for the classification of data being used
with the device. Furthermore, systems, processes, procedures, storage facilities, etc., using a
collection of administrative data which fall within more than one data classification, must protect
the entire collection according to the collections’ data with the highest classification.
P a g e | 2 of 3




Administrative Data Policy
Responsible Administrative Unit:

Computing, Communications & Information
Technologies


Issued: March, 2014
Policy Contact: Chief Information Officer,


Revised:


7.0 VIOLATIONS
Suspected or actual breaches, losses or other inadvertent or unauthorized exposure of
administrative data (regardless of its data classification), must be immediately reported to the Chief
Information Security Officer (CISO). If actual or suspected criminal or fraudulent activity may also
be associated with an administrative data event, appropriate law enforcement must be advised as
well. Alleged violations of the IT policy and/or procedures will be pursued in accordance with the
appropriate disciplinary procedures for faculty, staff, and students, as outlined in the Faculty
Handbook, State Personnel Rules, Student Handbook Policies, and other applicable materials.

P a g e | 3 of 3