Written Information Security Program (WISP)
Introduction
The objectives of this comprehensive written information security program (“the Program”) include defining, documenting, and supporting the implementation and maintenance of the administrative, technical, and physical safeguards the University of Chicago has selected to protect the personal and other sensitive information it collects, creates, uses, and maintains.
Designated Individuals
Responsible University Official(s): Chief Information Security Officer
Responsible Office: Information Security, a department of IT Services
Purpose
The University of Chicago Program is intended to:
- Ensure the security, confidentiality, integrity, and availability of personal and other sensitive information that the University of Chicago collects, creates, uses, and maintains.
- Protect against any anticipated threats or hazards to the security, confidentiality, integrity, or availability of such information.
- Protect against unauthorized access to or use of University of Chicago-maintained personal and other sensitive information that could result in substantial harm or inconvenience to any member of the University community or employee.
- Define an information security program that is appropriate to the University of Chicago’s size, scope, and business, its available resources, and the amount of personal and other sensitive information the University of Chicago owns or maintains on behalf of others while recognizing the need to protect both customer and employee information.
- Ensure adherence to the University of Chicago’s Information Security Policy.
Applicability
Per the University of Chicago’s Information Security Policy, this Program applies to “all University faculty, associates, other academic appointees, students, staff, volunteers, and contractors (“Covered Persons”).”
This Program applies to all University information technology resources used to conduct University activities in support of the academic, research, and service mandates of the University, connect to the University network, or store University data or information. This includes data processed or stored and applications used by the University in hosted environments where the University does not operate the technology infrastructure.
Program Ownership
- Responsible University Officer(s): Assistant Vice President and Chief Information Security Officer
- Responsible Office: Information Security, a department of IT Services
- Effective date: June 26, 2024
- Last Updated: February 13, 2025
Roles and Responsibilities
The University of Chicago has designated the Assistant Vice President and Chief Information Security Officer (CISO) and the Information Security team to implement, coordinate, and maintain this Program. University of Chicago Information Security shall be responsible for:
- Implementation and maintenance of this Program, including:
- Assessing internal and external risks to personal and other sensitive information and maintaining related documentation, including vendor and infrastructure risk assessment reports;
- Coordinating the development, distribution, and maintenance of information security policies, standards and procedures;
- Coordinating the design of reasonable and appropriate administrative, technical, and physical safeguards to protect personal and other sensitive information;
- Ensuring that the safeguards are implemented and maintained to protect personal and other sensitive information throughout the University of Chicago, where applicable;
- Overseeing service providers that access or maintain personal and other sensitive information on behalf of the University of Chicago;
- Monitoring and testing the Program’s implementation and effectiveness on an ongoing basis;
- Defining and managing incident response procedures; and
- Establishing and managing enforcement policies and procedures for this Program in collaboration with the University of Chicago human resources and management.
- Maintaining this Program.
- Engaging qualified information security personnel, including:
- Providing them with security updates and training sufficient to address relevant risks; and
- Verifying that they take steps to maintain current information security knowledge.
- Making available to staff, researchers, and privileged users, including:
- Providing periodic training on relevant information security policies, including the University of Chicago’s Information Security Policy.
- Retaining training and acknowledgment records.
- Defining and managing an exceptions process to review, approve or deny, document, monitor, and periodically reassess any necessary and appropriate, business-driven requests for deviations from this Program or the University of Chicago’s cyber security policies, procedures, standards, and guidelines.
- Periodically, but at least annually, reporting to the University of Chicago’s management and the Board of Trustees in writing regarding the status of the Program and the University of Chicago’s safeguards to protect personal and other sensitive information, including the Program’s overall status, compliance with applicable laws and regulations, material matters related to the Program, such as risk assessment, risk management and control decisions, service provider arrangements, testing results, cyber incidents or policy violations and management’s responses, and recommendations for Program changes, per the University of Chicago’s Information Security Policy.
Related Security Policies and Procedures
As a part of this Program, the University of Chicago will develop, maintain, and distribute information security policies and standards with applicable laws and regulations.
Establish and Maintain the following policies:
- University of Chicago Acceptable Use Policy
- University of Chicago Information Security Policy
- Information Technology Resources and Account Privacy Policy
- University of Chicago Information Classification Guideline
- University of Chicago CNetID Account Management Practices and Password Requirements
- University of Chicago Policy 601 – Treatment of Confidential Information
- Network Border Firewall Security Zone Policy
Maintain all cybersecurity standards established to protect institutional data;
- Information Security Standards
- Physical Environmental Standards
- Sanitization of Digital Storage Media Standard
- Network Security Zones Standard
- IT Disaster Recovery Plan
Ensure policies and standards are in alignment with applicable federal, state, and local regulations;
- Family Educational Rights and Privacy Act (FERPA)
- General Data Protection Regulation (GDPR)
- Gramm-Leach-Bliley Act (GLBA)
- Health Insurance Portability and Accountability Act (HIPAA)
- Payment Card Industry (PCI)
- UCMC SSA Addendum
Identification and Assessment of Risks to the University of Chicago
As a part of developing and implementing this Program, the University of Chicago will conduct and base its information security Program on a periodic, documented risk assessment, at least annually or whenever there is a material change in the University of Chicago’s business practices that may implicate the security, confidentiality, integrity, or availability of records containing personal or other sensitive information. This process is outlined by the University of Chicago’s Security Framework Assessment.
Data Safeguards
The University of Chicago will develop, implement, and maintain reasonable administrative, technical, and physical safeguards in accordance with applicable laws and standards to protect the security, confidentiality, integrity, and availability of personal or other sensitive information that the University of Chicago owns or maintains on behalf of others.
Data Classification
The University of Chicago employs a comprehensive data classification schema that leverages three levels of classification. Each category denotes a unique level of sensitivity. Data classification is as follows:
- Public
- Internal
- Restricted
Human Resources Policy 601 provides additional guidance on handling Restricted or Confidential Information. Data Stewards must classify data they work with and ensure that the appropriate levels of security controls are applied to the data.
Encryption
The University of Chicago requires that all users employ University of Chicago Information Security approved encryption solutions to all restricted University of Chicago data to preserve the confidentiality and integrity of and control the accessibility to, where this data is processed, stored or transmitted. The University’s Statement on Encryption and Cryptographic Hashing Standards provides detailed requirements for encryption and hashing standards.
Access & Storage
Access to University of Chicago data and systems is granted through authorized access controls established by the University of Chicago.
Data Destruction
Records containing personal or sensitive information are destroyed once the information is no longer fit for business needs unless federal guidelines require that information be destroyed by a particular time frame. Data is destroyed in such a way that cannot be recovered after the process is complete, per the University’s Sanitization of Digital Media Storage requirements.
Computer System Safeguards
The University of Chicago applies industry best practices to maintaining the confidentiality, availability, and integrity of information systems by maintaining up-to-date firewall protection, operating system security patches, and malware protection. The End-User Device Policy requires that devices run, “a supported operating system that automatically receives security updates,” and that, “up-to-date security patches are installed at least monthly, among other key policy tenets. The University of Chicago performs regular Intrusion Detection monitoring and logging to prevent unauthorized access.
Password Requirements
The University of Chicago requires that all users and members authenticate with an unique ID and password to access systems and data. Passwords must adhere to the University of Chicago CNetID Account Management Practices and Password Requirements. The University of Chicago may require higher forms of authentication such as Single Sign On (SSO) or Multi-Factor Authentication (MFA).
Third Party Agreements
The University of Chicago will assess each of its service providers that may have access to or otherwise create, collect, use, or maintain personal or other sensitive information on its behalf by evaluating the service provider’s ability to implement and maintain appropriate security measures, consistent with this Program and all applicable laws and University of Chicago’s obligations, requiring the service provider by contract to implement and maintain reasonable security measures, consistent with this Program and all applicable laws and University of Chicago’s obligations, or, failing that, documenting the associated risks and prompting leadership of the University unit to formally accept those risks.
Incident Response and Reporting
Incidents that raise concerns about the privacy or security of Personal Information must be reported promptly upon discovery to the University of Chicago Information Security team, per the University of Chicago’s Information Security Policy. The Information Security Incident Response Team shall investigate all reported security incidents and Breaches. The Information Security Incident Response Team is responsible for:
- Development and maintenance of the University of Chicago’s information security incident response plan.
- Coordination and response to incidents in accordance with the requirements of federal, state and local laws.
- Minimize the potential negative impact to the University of Chicago, clients and third parties as a result of such incidents.
- Restoration of services to a normalized and secure state of operation in coordination with service owners.
- Provision of clear and timely communication to all interested parties.
Enforcement
Per the University of Chicago’s Information Security Policy, non-adherence may “result in disciplinary action, up to and including the suspension of network privileges, suspension or expulsion from further study and termination of employment.”
Contacts
Associate Vice President and Chief Information Officer | cio@uchicago.edu | 773.702.5800 |
IT Services Information Security Office | security@uchicago.edu | 773.702.2378 |
Assistant Vice President and Chief Information Security Officer | ciso@uchicago.edu | 773.702.2378 |
Revision Authority: | Assistant Vice President and Chief Information Officer |
Revision History
This Program shall be subject to periodic review and updates to ensure relevancy.
Date | Description of Change | Reviewer |
---|---|---|
12/05/2024 | V1.0 draft | Jessica Sandy |
1/30/25 | Added link to UCMC SSA Addendum | Gabe McElwain |
2/13/2025 | Minor edits and review | Matt Morton |