Section: Information Technology
Policy Number: 904Responsible Office: Information Technology
Effective Date: 5/1/19Revised: 5/1/19
The purpose of the Identification and Authentication policy is to manage risks from user authentication and access to St. John’s University (St. John’s) information assets through the establishment of an effective identification and authentication program. The program helps St. John’s to implement identification and authentication security best practices.
This policy applies to the University Community. Adherence to this policy helps safeguard the confidentiality, integrity and availability of the University’s information assets, and protects the interest of the University, its customers, personnel and business partners.
The University implements and maintains proper controls on IT systems to confirm user identity prior to access. The University’s access protection measures provide assurance of individual accountability through the identification and authentication of each IT system user.
It is St. John’s policy to protect the confidentiality, integrity and availability of information systems. St. John’s IT Department:
The following are the definitions relevant to the policy:
The University reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. Instances of non-compliance must be presented to and reviewed and approved by the CIO, the Director of Information Security, or the equivalent officer(s).
All breaches of information security, actual or suspected, must be reported to, and investigated by the CIO and the Director of Information Security.
Those who violate security policies, standards, or security procedures are subject to disciplinary action up to and including loss of computer access and appropriate disciplinary actions as determined by the University.