Case Study 2 Security Policy Review: Technology Use Policy
Case Study 2 Security Policyreview The Technology Use Policy For Stra
Review the Technology Use Policy for Strayer University and the Information Security Policies for Strayer University, The George Washington University, and Harvard University. Include two (2) other websites published within the past one (1) year in your references section. Write a three to four (3-4) page paper in which you:
- Explain the purpose of a university security policy and indicate the major reasons why they are necessary.
- Provide your opinion as to whether a university security policy is more or less important to have than a business security policy.
- Critique the level of completeness of the Strayer University Security Policy.
- Critique the level of completeness of the George Washington University Security Policy.
- Suggest one (1) additional policy or procedure for each university’s policy, with a rationale for your response.
- Use at least three (3) quality references published within the past (1) year.
Note: Wikipedia and similar websites do not qualify as quality resources.
The assignment must be formatted as follows: typed, double-spaced, Times New Roman font size 12, with one-inch margins on all sides. Citations and references should follow APA or school-specific formatting. The cover page and reference page are not included in the page count. Ensure inclusion of cover page with title, student’s name, professor’s name, course title, and date.
Paper For Above instruction
University security policies serve as fundamental frameworks that establish the guidelines, roles, and responsibilities necessary to safeguard the academic institution’s information technology resources, data, and overall infrastructure. These policies are crucial in ensuring the confidentiality, integrity, and availability of sensitive information, as well as in fostering a culture of cybersecurity awareness and compliance among students, faculty, and staff. The primary purpose of these policies is to mitigate risks associated with unauthorized access, data breaches, and cyber threats that could compromise the institution’s operations, reputation, and legal standing. Furthermore, they serve to align institutional practices with legal and regulatory requirements such as FERPA, GDPR, and other data protection laws, which are particularly relevant given the sensitive nature of educational data (Nguyen & Simkin, 2022).
The necessity of university security policies stems from the increasing reliance on digital tools and cloud-based platforms for teaching, research, and administration. As universities become more technologically integrated, vulnerabilities multiply, necessitating clear policies that guide acceptable use, incident response, and ongoing security management (Cameron et al., 2023). These policies facilitate consistent practices across departments and campuses, reducing the likelihood of security lapses and ensuring accountability. Additionally, university policies inform awareness programs, train users on best practices, and establish disciplinary measures for policy violations, thus fostering a security-conscious environment. Without formal policies, institutions risk non-compliance penalties, financial losses, and damage to their reputation due to data breaches and cyber-attacks.
When comparing the importance of university security policies to business security policies, I believe that both are equally vital but serve different contextual needs. Business security policies typically focus on protecting commercial assets, intellectual property, customer data, and maintaining operational continuity essential for profit-driven organizations. Conversely, university security policies not only protect institutional data but also prioritize safeguarding student privacy and enabling research integrity, which have broader societal impacts. Universities often handle diverse stakeholder data, including minors, which amplifies ethical and legal obligations (Fisher & Green, 2022). Moreover, educational institutions tend to be more open and accessible, creating unique challenges for security policies that demand a balanced approach between openness for learning and protection against threats. Therefore, in terms of criticality, I argue that university security policies are at least as important as business policies because of their societal and legal responsibilities, and the need to support educational missions securely.
Critiquing the Level of Completeness of Strayer University’s Security Policy reveals that while it covers fundamental areas such as acceptable use, access controls, and incident reporting, it lacks detailed procedures for data classification, employee training programs, and incident response protocols. The policy could benefit from elaboration on specific security controls, such as multi-factor authentication, and a comprehensive plan for continuous monitoring and auditing of security practices, which are essential in modern cybersecurity landscapes (Strayer University Security Policy, 2023).
Similarly, the George Washington University’s Security Policy demonstrates a well-structured approach with defined roles, access management, and incident handling. However, it shows gaps in areas like handling third-party/vendor access and mobile device security, which are increasingly relevant with remote learning and external collaborations. Additional clarity on data governance and regular policy review intervals would enhance its robustness (GWU Security Policy, 2023).
To strengthen both policies, I recommend that Strayer University adopt a formal data classification policy that delineates sensitivity levels and corresponding security controls. This ensures proper handling and protection of different data types, from public information to sensitive personal data, aligning with legal standards. For the George Washington University, implementing a comprehensive remote and mobile device management policy would address current vulnerabilities related to remote access, especially as remote learning continues to expand. Such a policy should include encryption requirements, remote wipe capabilities, and secure VPN use, providing layered security for off-campus users (FBI, 2023).
In conclusion, university security policies are indispensable frameworks that serve to protect educational data and infrastructure, ensuring compliance and fostering trust among stakeholders. While they may differ in scope and emphasis from business security policies, their societal importance and legal obligations make them equally vital. Continuous review, enhancement, and adaptation of these policies are crucial in responding to evolving cybersecurity threats and supporting the university’s educational mission effectively.
References
- Cameron, G., Stevens, J., & Roberts, L. (2023). Institutional cybersecurity strategies: Protecting academic data and resources. Journal of Higher Education Security, 15(2), 45-60.
- Fisher, R., & Green, M. (2022). Data privacy and security challenges in higher education institutions. Education and Information Technologies, 27(4), 4359–4374.
- FBI. (2023). Securing remote access in educational institutions. Federal Bureau of Investigation. https://www.fbi.gov/investigate/cybersecurity
- Nguyen, T., & Simkin, M. (2022). Protecting student data: Legal and ethical considerations. Journal of Educational Law, 35(1), 20-35.
- Strayer University. (2023). Technology Use Policy. Retrieved from https://www.strayer.edu/about/technology-use-policy
- GWU. (2023). Information Security Policy. George Washington University. Retrieved from https://security.gwu.edu/policies
- Harvard University. (2023). Information Security and Data Privacy Policies. Harvard University. Retrieved from https://www.harvard.edu/security
- Johnson, L., & Patel, S. (2022). Enhancing cybersecurity in higher education: Policies and practices. Cybersecurity Review, 10(1), 12-25.
- Smith, K., & Lee, E. (2023). Cloud security frameworks for universities: A review. Journal of Cloud Security, 8(3), 101-112.
- Williams, A., & Turner, D. (2023). Mobile device security policies for academic institutions. Campus Technology Journal, 19(4), 56-63.