Section: Information Technology
Policy Number: 904Responsible Office: Information Technology
Effective Date: 5/1/19Revised: 5/1/19; 6/11/20
The purpose of the Identification and Authentication policy is to manage risks from user authentication and access to St. John’s University (St. John’s) information assets through the establishment of an effective identification and authentication program. The program helps St. John’s to implement identification and authentication security best practices.
This policy applies to the University Community. Adherence to this policy helps safeguard the confidentiality, integrity, and availability of St. John’s information assets, and protects the interest of St. John’s, its customers, personnel, and business partners.
St. John’s implements and maintains proper controls on IT systems to confirm user identity prior to access. St. John’s access protection measures provide assurance of individual accountability through the identification and authentication of each IT system user.
It is St. John’s policy to protect the confidentiality, integrity and availability of information systems. St. John’s IT Department:
The following are the definitions relevant to the policy:
St. John’s reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. Instances of non-compliance must be presented to, reviewed, and approved by the CIO, the Director of Information Security, or the equivalent officer(s).
All breaches of information security, actual or suspected, must be reported to, and investigated by the CIO and the Director of Information Security.
Those who violate security policies, standards, or security procedures are subject to disciplinary action up to and including loss of computer access and appropriate disciplinary actions as determined by St. John’s.