Written Information Security Program (WISP)

Introduction

The objectives of this comprehensive written information security program (“the Program”) include defining, documenting, and supporting the implementation and maintenance of the administrative, technical, and physical safeguards the University of Chicago has selected to protect the personal and other sensitive information it collects, creates, uses, and maintains.

Designated Individuals

Responsible University Official(s): Chief Information Security Officer
Responsible Office: Information Security, a department of IT Services

Purpose

The University of Chicago Program is intended to:

  • Ensure the security, confidentiality, integrity, and availability of personal and other sensitive information that the University of Chicago collects, creates, uses, and maintains.
  • Protect against any anticipated threats or hazards to the security, confidentiality, integrity, or availability of such information.
  • Protect against unauthorized access to or use of University of Chicago-maintained personal and other sensitive information that could result in substantial harm or inconvenience to any member of the University community or employee.
  • Define an information security program that is appropriate to the University of Chicago’s size, scope, and business, its available resources, and the amount of personal and other sensitive information the University of Chicago owns or maintains on behalf of others while recognizing the need to protect both customer and employee information.
  • Ensure adherence to the University of Chicago’s Information Security Policy.

 

Applicability

Per the University of Chicago’s Information Security Policy, this Program applies to “all University faculty, associates, other academic appointees, students, staff, volunteers, and contractors (“Covered Persons”).”

This Program applies to all University information technology resources used to conduct University activities in support of the academic, research, and service mandates of the University, connect to the University network, or store University data or information. This includes data processed or stored and applications used by the University in hosted environments where the University does not operate the technology infrastructure.

 

Program Ownership

  • Responsible University Officer(s): Assistant Vice President and Chief Information Security Officer
  • Responsible Office: Information Security, a department of IT Services
  • Effective date: June 26, 2024
  • Last Updated: February 13, 2025

 

Roles and Responsibilities

The University of Chicago has designated the Assistant Vice President and Chief Information Security Officer (CISO) and the Information Security team to implement, coordinate, and maintain this Program. University of Chicago Information Security shall be responsible for:

  • Implementation and maintenance of this Program, including:
    • Assessing internal and external risks to personal and other sensitive information and maintaining related documentation, including vendor and infrastructure risk assessment reports;
    • Coordinating the development, distribution, and maintenance of information security policies, standards and procedures;
    • Coordinating the design of reasonable and appropriate administrative, technical, and physical safeguards to protect personal and other sensitive information;
    • Ensuring that the safeguards are implemented and maintained to protect personal and other sensitive information throughout the University of Chicago, where applicable;
    • Overseeing service providers that access or maintain personal and other sensitive information on behalf of the University of Chicago;
    • Monitoring and testing the Program’s implementation and effectiveness on an ongoing basis;
    • Defining and managing incident response procedures; and
    • Establishing and managing enforcement policies and procedures for this Program in collaboration with the University of Chicago human resources and management.
    • Maintaining this Program.
  • Engaging qualified information security personnel, including:
    • Providing them with security updates and training sufficient to address relevant risks; and
    • Verifying that they take steps to maintain current information security knowledge.
    • Making available to staff, researchers, and privileged users, including:
      • Providing periodic training on relevant information security policies, including the University of Chicago’s Information Security Policy.
      • Retaining training and acknowledgment records.
  • Defining and managing an exceptions process to review, approve or deny, document, monitor, and periodically reassess any necessary and appropriate, business-driven requests for deviations from this Program or the University of Chicago’s cyber security policies, procedures, standards, and guidelines.
  • Periodically, but at least annually, reporting to the University of Chicago’s management and the Board of Trustees in writing regarding the status of the Program and the University of Chicago’s safeguards to protect personal and other sensitive information, including the Program’s overall status, compliance with applicable laws and regulations, material matters related to the Program, such as risk assessment, risk management and control decisions, service provider arrangements, testing results, cyber incidents or policy violations and management’s responses, and recommendations for Program changes, per the University of Chicago’s Information Security Policy.

 

Related Security Policies and Procedures

As a part of this Program, the University of Chicago will develop, maintain, and distribute information security policies and standards with applicable laws and regulations.

Establish and Maintain the following policies:

Maintain all cybersecurity standards established to protect institutional data;

Ensure policies and standards are in alignment with applicable federal, state, and local regulations;

 

Identification and Assessment of Risks to the University of Chicago

As a part of developing and implementing this Program, the University of Chicago will conduct and base its information security Program on a periodic, documented risk assessment, at least annually or whenever there is a material change in the University of Chicago’s business practices that may implicate the security, confidentiality, integrity, or availability of records containing personal or other sensitive information. This process is outlined by the University of Chicago’s Security Framework Assessment.

 

Data Safeguards

The University of Chicago will develop, implement, and maintain reasonable administrative, technical, and physical safeguards in accordance with applicable laws and standards to protect the security, confidentiality, integrity, and availability of personal or other sensitive information that the University of Chicago owns or maintains on behalf of others.

 

Data Classification

The University of Chicago employs a comprehensive data classification schema that leverages three levels of classification. Each category denotes a unique level of sensitivity. Data classification is as follows:

  1. Public
  2. Internal
  3. Restricted

Human Resources Policy 601 provides additional guidance on handling Restricted or Confidential Information. Data Stewards must classify data they work with and ensure that the appropriate levels of security controls are applied to the data.

 

Encryption

The University of Chicago requires that all users employ University of Chicago Information Security approved encryption solutions to all restricted University of Chicago data to preserve the confidentiality and integrity of and control the accessibility to, where this data is processed, stored or transmitted. The University’s Statement on Encryption and Cryptographic Hashing Standards provides detailed requirements for encryption and hashing standards.

 

Access & Storage

Access to University of Chicago data and systems is granted through authorized access controls established by the University of Chicago.

 

Data Destruction

Records containing personal or sensitive information are destroyed once the information is no longer fit for business needs unless federal guidelines require that information be destroyed by a particular time frame. Data is destroyed in such a way that cannot be recovered after the process is complete, per the University’s Sanitization of Digital Media Storage requirements.

 

Computer System Safeguards

The University of Chicago applies industry best practices to maintaining the confidentiality, availability, and integrity of information systems by maintaining up-to-date firewall protection, operating system security patches, and malware protection. The End-User Device Policy requires that devices run, “a supported operating system that automatically receives security updates,” and that, “up-to-date security patches are installed at least monthly, among other key policy tenets. The University of Chicago performs regular Intrusion Detection monitoring and logging to prevent unauthorized access.

 

Password Requirements

The University of Chicago requires that all users and members authenticate with an unique ID and password to access systems and data. Passwords must adhere to the University of Chicago CNetID Account Management Practices and Password Requirements. The University of Chicago may require higher forms of authentication such as Single Sign On (SSO) or Multi-Factor Authentication (MFA).

 

Third Party Agreements

The University of Chicago will assess each of its service providers that may have access to or otherwise create, collect, use, or maintain personal or other sensitive information on its behalf by evaluating the service provider’s ability to implement and maintain appropriate security measures, consistent with this Program and all applicable laws and University of Chicago’s obligations, requiring the service provider by contract to implement and maintain reasonable security measures, consistent with this Program and all applicable laws and University of Chicago’s obligations, or, failing that, documenting the associated risks and prompting leadership of the University unit to formally accept those risks.

 

Incident Response and Reporting

Incidents that raise concerns about the privacy or security of Personal Information must be reported promptly upon discovery to the University of Chicago Information Security team, per the University of Chicago’s Information Security Policy. The Information Security Incident Response Team shall investigate all reported security incidents and Breaches. The Information Security Incident Response Team is responsible for:

  • Development and maintenance of the University of Chicago’s information security incident response plan.
  • Coordination and response to incidents in accordance with the requirements of federal, state and local laws.
  • Minimize the potential negative impact to the University of Chicago, clients and third parties as a result of such incidents.
  • Restoration of services to a normalized and secure state of operation in coordination with service owners.
  • Provision of clear and timely communication to all interested parties.

 

Enforcement

Per the University of Chicago’s Information Security Policy, non-adherence may “result in disciplinary action, up to and including the suspension of network privileges, suspension or expulsion from further study and termination of employment.”

 

Contacts

Associate Vice President and Chief Information Officer cio@uchicago.edu 773.702.5800
IT Services Information Security Office security@uchicago.edu 773.702.2378
Assistant Vice President and Chief Information Security Officer ciso@uchicago.edu 773.702.2378
Revision Authority: Assistant Vice President and Chief Information Officer  

 

 

Revision History

This Program shall be subject to periodic review and updates to ensure relevancy.

Date  Description of Change  Reviewer
12/05/2024 V1.0 draft Jessica Sandy
1/30/25 Added link to UCMC SSA Addendum Gabe McElwain
2/13/2025 Minor edits and review Matt Morton