Skip to Content
California State University, Long BeachCalifornia State University, Long Beach


    1. CSU Information Security Policy
    2. References
    3. Responsibilities for Campus Information Resource Personnel
    1. Protection Against Natural/Accidental Disasters
    2. Protection Against Intentional Disasters
    3. Management Controls and Procedures
    1. Ownership
    2. Access to Data
    3. Data Protection
    4. Data Validity and Integrity
    5. Privacy
    1. Computing Practices and Security Awareness for Users
    2. California Penal Code - Section 502
    3. Access To and Use of CSULB Computing Resources




The Board of Trustees (BOT) of the California State University CSU) is responsible for protecting the confidentiality of information in the custody of the CSU, the security of the equipment where this information is processed and maintained, and the related privacy rights of the CSU students, faculty and staff concerning this information. This policy applies to all students, faculty and staff, consultants employed by the CSU, or any other person having access to CSU information technology resources. The unauthorized modification, deletion, or disclosure of information included in CSU data files and data bases can compromise the integrity of CSU programs, violate individual privacy rights, and possibly constitute a criminal act. This responsibility is delegated to the campus Presidents in accordance with CSU policies. In order to implement these policies and procedures, each campus President and the Chancellor should designate an Information Security Officer (ISO) to oversee this important program.

To ensure that the Information Security Officer is not in a position of conflict of interest, he/she should not have immediate direct responsibility for a data processing facility (e.g. computer operations manager), nor should he/she be an official having program responsibility for the confidential information. If possible, he/she should be independent of, and have no personal responsibility for campus programs that rely on the confidential information or computer operations which manipulate and store the information. The responsibilities and duties of the Information Security Officer are delineated, at a minimum, in this policy statement.

If the Campus Information Security Officer and the campus Information Resource Manager are not the same person, the Information Security Officer should keep the Information Resource Manager informed of any changes of security and confidentiality procedures affecting the Information Resource Management program. Similarly, the campus Information Resource Manager should provide coordination and services support to the Information Security Office in the area of security and confidentiality as requested.


Article 1, Section 1, of the Constitution of the State of California, defines pursuing and obtaining privacy as a inalienable right.

The Information Practices Act of 1977 (Civil Code Section 1798, et seq.) places specific requirements on State agencies in the collection, use, maintenance, and dissemination of information relating to individuals.

The California Public Records Act (Government Code Sections 62506265) provides for the inspection of public records.

The Comprehensive Computer Data Access and Fraud Act (Penal Code Section 502) affords protection to individuals, businesses, and governmental agencies from tampering, interference, damage, and unauthorized access to lawfully created computer information systems. It allows for civil action against any person convicted of violating the criminal provisions for compensatory damages.

Title V section 42396.2(d) of the California Code of Regulations confirms the right to privacy in California and states an intent to implement it within the CSU.

The Family Education Rights and Privacy Act (20 U.S.C. Section 1232g) (commonly referred to as FERPA or the Buckley Amendment) is a federal statute applicable to every institution which receives federal funds. It protects students (and former students) from the release of personal information about them. It provides for the right of a student to inspect and review his or her own education record, the right to request the records be amended, and the right to some control over the disclosure of personally identifiable data from such records.


The physical security of computer-stored information is the responsibility of the computer installation holding such information and includes but is not limited to delivery of output, disposal of waste material, and on-site access, as required by the owners of the data. The computer installation is also responsible for providing the means of controlling access to confidential information by terminals and programs as required by the owners of the data.

Administrative control of the access to and use of computer-stored information is the responsibility of the user which collects or receives and maintains that information. All confidential files shall have access restricted by such owner through passwords or other similar means. The owner of confidential data must also establish and periodically disseminate the rules of access.


  1. Responsible for protection of all campus information resource assets and proper reporting of all losses and violations of information confidentiality, security, and privacy policies and procedures.
  2. Appoints Information Security Officer.
  3. Delegates review and investigative authority to Information Security Officer.
  4. Ensures independence of Information Security Officer and the compliance function.
  5. Provides necessary resources for the Information Security Officer to carry out his/her function.
  6. Provides necessary training for the Information Security Officer to carry out his/her function.


  1. Promotes and encourages good security policies and procedures.
  2. Performs appropriate risk analysis.
  3. Prepares and maintains a manual of campus security procedures for applications, data bases, remote access, distributed processors, and microcomputers.
  4. Monitors to ensure compliance of privacy and information security policies and procedures.
  5. Identifies and reduces vulnerabilities.
  6. Informs campus President and others about security matters.
  7. Coordinates determination of the priority and data sensitivity of applications and other information processing activities.
  8. Coordinates cost/benefit analysis to determine level of security required.
  9. Ensures establishment and existence of backup, disaster, and recovery capabilities.
  10. Develops campus-specific public access implementation policies and procedures.
  11. Following notification by Public Safety, investigates violations of security and confidentiality policies and procedures.
  12. Annually develops a summary report of computing equipment losses and violations of security and confidentiality policies and procedures.
  13. Implements procedures to assist in the development of security awareness in personnel.
  14. Develops plans to test existing security safeguards.
  15. Annually, performs audit of all confidentiality and security policies and procedures to ensure highest confidence in those policies and procedures.


  1. Identifies and classifies sensitive data.
  2. Identifies authorized users of data.
  3. Assists with the identification of exposures related to vulnerabilities.
  4. Makes public access decisions based on decision-making criteria with the concurrence of the Information Security Officer.
  5. Maintains required level of security.
  6. Applies sanctions an disciplines for security violations.
  7. Reports to Public Safety all computing equipment losses due to theft.
  8. Reports to the Information Security Officer all violations of security and confidentiality policies and procedures.
  9. Develops and implements procedures to foster awareness in personnel of the importance of, and responsibility for, the security of computing equipment, data, and information.


  1. Understands and implements CSU security policies and procedures.
  2. Understands security problems in a data processing environment.
  3. Addresses data security requirements in all systems development.
  4. Explains available security tools to program managers.
  5. Tests security measures.
  6. Implements technical security measures specified by program manager.
  7. Reports to Public Safety all losses of equipment due to theft.
  8. Reports to the Information Security Officer all violations of security and confidentiality policies and procedures.
  9. Develops and implements procedures to foster awareness in personnel of the importance of, and responsibility for, the security of computing equipment, data, and information.


  1. Provides logical security features and tools for use by program managers.
  2. Describes procedure requirements to protect against natural, accidental, and intentional disasters.
  3. Describes required facilities management controls and procedures.
  4. Reviews system development designs for adequacy of security provisions.
  5. Ensures that security provisions are implemented as designed.
  6. Performs risk analysis with Information Security Officer.
  7. Provides assurance that computer information is adequately secured prior to implementing general public access.
  8. Regularly inventories computing equipment and reports unexplained losses to the Information Securities Officer and other proper officials.
  9. Reports to Public Safety all equipment losses due to theft.
  10. Reports to the Information Security Officer all violations of security and confidentiality.
  11. Develops and implements procedures to foster awareness in personnel of the importance of, and responsibility for, the security of computing equipment, data, and information.
  12. Insures adequacy of safeguards of irrecoverable corporate data assets.


  1. Strictly observes all laws, policies, and procedures related to privacy, confidentiality, and security of information.
  2. Reports to Public Safety all losses of equipment due to theft.
  3. Reports to the Information Security Officer all violations of security and confidentiality policies and procedures.
  4. Develops and implements procedures to foster awareness in personnel of the importance of, and responsibility for, the security of computing equipment, data, and information resources.


  1. Participates in the development of the campusí statement of security procedures.
  2. Receives and investigates all reports of computing equipment thefts.
  3. Responsible for, at a minimum, annual reporting to the Information Security Officer of thefts, specifically identifying information technology resources.


A. Protection Against Natural/Accidental Disasters

Fire Plan

All employees should be familiar with the building fire plan. An annual Fire/Emergency Exit Drill must be coordinated with the University Police Fire/Emergency Planning coordinator. All areas have portable fire extinguishers available for use in emergencies and each employee must be aware of their location and method of use. Managers will visually inspect all fire fighting equipment in their area of responsibility. A deficiency record will be maintained pertaining to the following:

  1. Fire hose and fire extinguishers are at their assigned locations.
  2. All fire extinguishers equipped with a dial must indicate a "good" reading.
  3. All fire extinguishers are sealed and tagged, indicating the type and serviceability.
  4. Any variation from the above must be reported to the University Police Fire/Emergency Planning Coordinator (extension 4101) as soon as discovered.

The record should indicate: The date, time, who called, who they talked to and nature of discrepancy. The record must also show when the discrepancy was corrected.

The record will be available for inspection/review at any time.

In the event of a fire, or the smell of smoke: Call University Police Department Emergency 9-1-1. However, if you become fearful for your safety, sound the alarm and follow the established evacuation procedures.


  • The location of the fire. What is burning.
  • Any/all injuries - all handicapped personnel requiring assistance.
  • Your name.

Utilize the nearest fire alarm box.

Comply with evacuation instructions.

Send someone to meet the University Police Department.

Types of Fires

  • Class A. Fires in ordinary combustibles such as paper, wood, cloth, etc., which are extinguished by cooling.
  • Class B. Fires involving flammable liquids such as gasoline, oil, alcohol, benzine, ether, etc., which are extinguished by smothering.
  • Class C. Fires involving electrical equipment, appliances, and wiring in which the use of a non-conductive extinguishing agent is recommended.

Extinguish Class A fires with water. Extinguish Class B fires with carbon dioxide or Halon (1211). Extinguish Class C fires with carbon dioxide or Halon (1211).

However, water may be used after the involved area has been deenergized. All employees must know the location of all electrical control panels.

Types of Fire Extinguishers

It is important to use the correct type of extinguishing agent on any type of fire. Extinguishers should be of the type most suitable for the "class" of fire which may occur.

Extinguishers are classified as Type A, B, and C. Prolonged use of water possesses the greatest cooling effect of any readily available known substance. Since a cooling effect is required for Class A fires, water should be used.

A dense, heavier than air gas, powdered chemical, or foam should be used in Class B fires. The desired effect in Class B fires is smothering to exclude air. Class C fires require extinguishment by use of a non-conductive agent.

Fire Abatement Plan

The Computer Center can be characterized as a large electrical complex containing large quantities of flammable paper, card stock, etc. The fire hazard can be considered high.

Disaster Plan

A disaster is defined here as any circumstance where actual or anticipated interruption of regular Computer Center service occurs. Earthquakes, floods, enemy attacks, power loss, a fire, a bombing or explosion, a bomb threat, a riot, or civil disturbance are all disasters.

To Deal with Disaster

  1. Know the location of campus shelters.
  2. Know the telephone number of the University Police Departmentís Emergency Operations Center.
  3. Know how to evacuate the area and where to go.
  4. University Police Officers will take command during disasters.
  5. Shut down and secure the Computer Center before exiting the building.
  6. Call the University Police Department for assistance, extension 4101 or 9-1-1.

Work immediately critical to the University will be planned for off-site processing during lengthy emergencies.

Computer staff will report to the Computer Center from the University Police Department.

Evacuation Plan

Evacuation orders will come from the University Police Department.

  1. All electrically powered equipment will be powered down in the event of an emergency to minimize loss of data.
  2. Room lights will be left on to facilitate rescue and fire work.

Employee Safety and Welfare

Procedural guidelines for the safety and welfare of University employees are promulgated for the information of all concerned. Although disorders may not interrupt work routines on the campus, the following procedures are provided for employees guidance in the event local interruptions do occur:

  1. In the event of a disturbance, disorder, march on campus, or similar activity, employees are urged to remain at their work and away from the scene. (Curious observers are sometimes involved because of their mere presence in the area.)

  2. Unless otherwise directed, the highest level supervisor present in the area has the authority to release employees from work when he/she considers the circumstances warrant such precautions. The supervisor present shall direct employees to report to another area on campus safely away from the disturbance and shall remain with the employees in the area selected. He/she will contact the Staff Personnel Office for further instructions and advise the employees when it is safe to return to their work.

  3. If necessary to evacuate a building, all persons should stay at least 200 feet away. The fire alarm system may be used to evacuate buildings for reasons other than fire.

In addition to the above guidelines relative to leaving and returning to workstations during disturbances on campus, the following recommendations are considered appropriate:

  1. Be sure files and cabinets furnished with locks are locked and the office is not open. Be careful with office and file keys in your possession. Keep them in a safe place -- not in a place where they can easily be picked up by unauthorized personnel. Keeping personal items of value in your desk or in your work area is not advisable.

  2. Your physical safety is of the utmost importance. DO NOT attempt to fight to protect property, records, etc.

  3. If you suspect an object to be a bomb, stay away and get behind a wall if possible, a desk, or other solid protection. Do not touch or move the object.

  4. Do nothing to provoke demonstrators -- be courteous regardless of how you might feel about the situation and do not engage in arguments.

  5. The University Police Department can be contacted in case of an emergency by calling 9-1-1. Another extension is 4101. They are prepared to respond and to provide assistance as necessary.

Telephoned Bomb Threats

Telephoned bomb threats on this campus have occurred during the past several years. In the past, most threats were received by the switchboard operator. But, under the Ericsson system, they may be received on any telephone. The following policies and procedures are to protect persons and property, and to reduce disruption of normal activities to a minimum.

The telephone procedure by an employee receiving a threat is as follows:

  1. When a bomb threat telephone call is received, the person receiving the call will attempt to hold the call as long as possible and ask the caller detailed questions regarding:
    1. When is the bomb going to explode?
    2. Where is the bomb right now?
    3. What kind of bomb is it?
    4. What does it look like?
  2. Alert the supervisor immediately by writing the nature of the call on a piece of paper or some other means.
  3. The supervisor will immediately call the University Police Department, extension 4101 or 9-1-1, and give the following information:
    1. Identify location and department.
    2. Identify by name, the person calling.
    3. Explanation of the threatening call and bomb scare.
    4. Give the number the incoming call is on.
  4. In no case should any person, other than a University Police Officer, touch or move any suspected object or container.

Bomb Search Procedures

The University Police Department will conduct the bomb search. The Computer Center supervisor may be required to aid in this task because of his/her familiarity with the physical plant.

All suspicious objects will be reported immediately to the University Police Department.

No attempt should be made to move, touch, cover, or jar any suspicious object.

Evacuation will be ordered, if deemed necessary.

Evacuation of Buildings or Areas

  1. Required evacuation will normally be initiated by the use of the existing fire alarm system, followed by additional announcements by University Police Officers stationed outside the building. When the fire alarm is sounded, total evacuation is MANDATORY.

  2. Evacuation should be made calmly and smoothly. Elevators should be utilized only for evacuating paraplegic or otherwise handicapped persons. Remember that in practically every case, the purpose of a bomb threat is to create disruption and panic. You can assist by keeping all persons calm.

  3. Persons leaving the building or area should be instructed to:
    1. Take personal belongings with them.
    2. Leave doors and windows open and lights on.
    3. Go to an area at least two hundred feet from the building and out of line of any glass windows or doors of that facility.
  4. Key personnel, in the event of evacuation, should go to the University Police vehicle being used as a command post nearby to be available to assist the officers with information or crowd control.

Suspicious Packages

In a University this size, packages, briefcases, and similar objects are commonplace. However, there may be times when an object is so noticeably unusual, by either its means of delivery or locations, as to become "suspicious". In such a situation, the University Police Department should be called immediately (dial 9-1-1). In no case should the object be touched or moved by non-police personnel.

Written Bomb Threat

A bomb threat may be received in written form at the Computer Center. On reading such a threat, the University Police Department will be notified immediately. The documents will not be further handled once the contents are determined.

Fire Threats

Title 19 of the California Administrative Code requires colleges and universities to hold a fire drill on campus in order to familiarize students on evacuation procedures in case of emergency. During fire drill, the following procedures will be followed:

  1. The fire warning system will be activated simultaneously in all buildings on campus. The fire alarm in the residence halls consists of a continuous bell ringing and klaxon-type horn in all other buildings.

  2. When the fire alarm rings, all personnel will leave the buildings at a walk and move at least 200 feet away from the buildings.

  3. All other personnel in the open when the warning sounds, shall remain in the open and at least 200 feet away from the buildings.

  4. The evacuation of all classrooms shall be under the direction of instructors; occupants of rooms other than classrooms, including offices, shall leave buildings immediately by using the nearest exits.

  5. Upon evacuation from the building due to various circumstances, POWER-OFF COMPUTER AND EQUIPMENT.

  6. The fire drill will continue for 10 minutes when normal activities will resume.

Procedures to be Followed in Cases of Sudden Illness, Injury, or Apparent Death:

  1. Procedures to be followed during regular college business hours:

    1. Dial 9-1-1 for any emergency.

    2. Emergency calls on extension 9-1-1 between the hours of 8:00 a.m. and 6:00 p.m. are monitored simultaneously by the Health Center and the University Police Department. Based upon the information received, Medical personnel may be dispatched directly to the scene. Upon arrival, Medical personnel will determine what treatment is required and whether an ambulance is to be called.

  2. At times other than regular business hours:

    1. Dial 9-1-1 for any emergency.

    2. Emergency calls will be handled by the University Police Department. Based upon information received, the Long Beach Paramedics and/or ambulance may be dispatched at the same time the University Police unit is dispatched. Taking information as to an obviously critical condition, a University Police Officer upon arrival at the scene will determine whether Paramedics and/or ambulance should be

  3. In the event of death, the University Police Department will respond to the scene. Except by an officer, the body should not be touched or moved. The body should be covered, if possible. University Police will assume the responsibility except for notification of next of kin should be made by a co-worker, friend or acquaintance of the family through means of a personal visit rather than by telephone. The person who undertakes to inform the relative must act with due care. A delicate duty has been assumed and if a co-worker or friend of the family cannot be found on campus, the informant should endeavor to find someone such as a minister, doctor or off-campus friend to break the news gently and in person to the family.

B. Protection Against Intentional Disasters

The general policy of Information Technology Services is to restrict access to the production control and computer room areas to authorized personnel only. Other personnel will be admitted on a need-to-enter basis. Entrance to Information Technology Services may be authorized only by the Assistant Vice President for Information Technology Services, the Information Security Officer, or their designees.

All doors for normal access to the computer operations area shall have self-locking electronic or combination locks. Combinations shall be changed as employees terminate and at regular intervals.

All unauthorized or attempted intrusions shall be reported to the Assistant Vice President for Information Technology Services or the Information Security Officer when the Assistant Vice President for Information Technology Services is not available.

Limited Access

Access to other computer room shall be denied to all except authorized Information Technology Services personnel, Information Technology Services management, authorized vendor personnel, University Police, Fire Marshal, and assigned building maintenance personnel. All such personnel will be named on a "Authorized Access List." Other management personnel and visitors may be admitted if proper authorization is obtained from the Assistant Vice President for Information Technology Services or the Information Security Officer when the Assistant Vice President for Information Technology Services is not available.

Access by any personnel, other than those named on the Authorized Access List during non-scheduled hours, shall be controlled and shall require prior notification and authorization from the Assistant Vice President for Information Technology Services or the Information Security Officer when the Assistant Vice President for Information Technology Services is not available.

Internal Security

All computer operations personnel shall be trained in emergency procedures. Use of emergency switches and power-down procedures shall be understood by all operations personnel. There shall be emergency lighting in the computer and support areas. The auxiliary lighting system shall be tested at least twice a month.

All personnel shall be trained in the proper evacuation procedures to be used in the event of fire or acts of violence. Regularly scheduled drills shall be held and appropriate instructions shall be posted.

Smoking, eating, or drinking shall not be permitted in the computer room or tape library. These areas shall be kept clean.

Only authorized persons shall operate the computer system.

Confidential program listings and carbons which are not to be retained shall be placed in a designated area in the controlled environment. The material shall be removed at specified time and destroyed by shredding.

If material includes personal data such as names, addresses, phone numbers, and social security numbers or gives any information which can be identified with a particular person, the material shall be treated as confidential material.

Personnel Identification

Only those persons with acceptable identification and whose names appear on the Information Technology Services Authorized Access List or who have acceptable signed authorization from the Information Technology Services Assistant Vice President, the Information Security Officer, or their designee shall be admitted to the Information Technology Services Operations area.

All computer room visitors (a visitor is defined as a person whose name does not appear on the active Information Technology Services Authorized Access List) shall sign in and out on a log maintained at the desk of the Senior Computer Operator. Included on the log shall be name, organization, date, time in and out.

All visitors to the operations area shall be escorted to and from their destination by an employee of Information Technology Services. Visitors shall not be left unattended.

When appropriate, all packages, briefcases, tool cases, etc., shall be inspected upon entering and before leaving the operations area.

The Authorized Access List shall be updated periodically to reflect hiring, separations, and newly authorized accesses.

Software Security

Storage of backup data sets shall be maintained in a fireproof safe. The backup of all user data sets, programs, documentation, and procedures for recreating data sets is the responsibility of the user.

The operating systems shall have protection to prevent by-passing of security utilities.

All permanent mass storage files shall use, and change as necessary, access and modification privacy codes to prevent unauthorized access, tampering or destruction. Access and modification of blanks or asterisks shall not be used and will not be accepted for processing.

All permanent tape files shall be internally labeled and shall contain privacy codes to prevent unauthorized access, tampering, and destruction. Privacy codes shall be changed periodically.

Only members of the Information Technology Services Operation Support group and other persons as may be specifically authorized by the Information Technology Services Assistant Vice President or designee, shall have access to operating systems.

C. Management Controls and Procedures

Management control is the plan of organization and methods within the department which is designed to safeguard its records, check the reliability of its data, promote operational efficiency, and encourage adherence to prescribed policies.

Management Responsibility

The Assistant Vice president for Information Technology Services is responsible for the establishment of organizational, administrative, and procedural controls which are necessary to prevent access to data for unauthorized or improper purposes, reduce the incidence of error, and obtain optimum results from computer operations. Controls can be divided into groups as follows:

  1. Each employee should fully understand his or her duties, responsibilities, and limits of authority.

  2. Job Assignments, facilities, and procedures should be arranged so that, as far as possible, no one person will have complete control over an entire transaction of a related series of operations without the intervention of another employee or employees to provide a cross-check.

  3. In the assignment of duties and responsibilities, an organization chart should be maintained and be kept current and, as an adjunct, specific duty statements should be published and understood by all staff members.

  4. To be effective, internal controls must be reviewed periodically because of changes in personnel and duties. The most elaborate system of internal controls will not prevent inefficiencies or fraudulent practices unless adequate and continuous supervision is exercised. Controls must be consistent with the hazards involved and the cost of controls should be commensurate with the risk.

  5. Security procedures should be distributed to all management and responsible staff personnel and made available to all others who have a need to know.

  6. Principal points and important employee instructions for security procedures should be posted on employee bulletin boards.

  7. Emergency phone numbers should be prominently listed in internal phone booklets and maintained around the computer facility for emergency calls.

  8. All electrical appliances, such as lamps and clocks, used in or around the computer facility, must be UL approved.

  9. Emergency electrical and air conditioning shut-off switches and gas shut-off valves should be clearly marked and precise instructions posted nearby as to when and how they are to be used.

  10. Management should, wherever possible, eliminate possible sources of computer failure or transient malfunctions. Permanent or temporary conditions that create dust, excessive moisture, or conditions that promote corrosion should be avoided.

  11. Documentation for operational programs, manuals of system operating instructions, and other vital and important records should be stored in record protection equipment having a fire-resistant rating of one hour or better or at an off-site location.

  12. In order to apply proper safekeeping for difficult-to-replace records, securities, negotiable instruments, checks for deposit, highly confidential information or similar materials, should be stored in safes or vaults with at least a four hour fire-resistant rating or at an off-site location.


Since information may reside in Information Technology Services which could be detrimental to peopleís interest if allowed in unauthorized hands, every Information Technology Services employee shall exercise caution and care when handling data. Disclosure of the data to any unauthorized person either in detail or summary is absolutely prohibited and could result in discipline including termination.

The Information Technology Services Assistant Vice President shall periodically make inspections of sensitive files, computer and visitor logs, and precautionary procedures to ensure the maintenance of appropriate security measures.

All new employees of Information Technology Services shall review this security manual annually. All new University employees will receive data security information at their initial employee orientation. (See Appendix A)

The Information Technology Services Assistant Vice President shall make certain that all Information Technology Services employees receive security briefings according to schedule.

The staff of Information Technology Services, when appointed, will be subject to a background investigation which will be conducted during the course of their recruitment. The results of this investigation will be communicated only to the Information Technology Services Assistant Vice President.

Inventory of magnetic tapes and disk packs shall be taken at periodic intervals and missing items shall be reported to the Information Technology Services Assistant Vice President or the Information Security Officer when the Information Technology Services Assistant Vice President is not available.

Scratch tapes and disk packs shall be degaussed, blanked, or overwritten.

A. Ownership of Files

Data resident on data files is the property of other user holding the account number under which the data file was created.

All data files shall be physically maintained in the Information Technology Services facilities unless released at the request of the owner. A log of data file transactions shall be maintained.

The data file owner assumes responsibility for the confidentiality of the data when the physical data file or processed data is removed form Information Technology Services.

The data file owner is responsible for the prudent duplication of otherwise irreplaceable data files.

B. Access to Data Files

Data may be accessed by the owner of the data file.

Authorization for access of data must be in writing with a copy forwarded to Information Technology Services.

If necessary, data may be accessed by a member of the CSU staff having direct line authority over the data file owner. In such instances, the data file owner shall be so informed.

Information Technology Services shall prevent unwarranted disclosure of information from discarded printed and other output by shredding output with confidential information.

C. Data Protection

There shall be a separate data file storage area with procedures provided for logging data files IN and OUT; keeping a current list identifying persons who are authorized to receive data files; keeping records to indicate the precise locations of all data files at all times; performing follow-up work to retrieve issued data files not returned to the library within prescribed time limits; and identifying data files which are no longer needed in accordance with established file expiration dates.

All data files shall be clearly labeled. The label shall show the name of the file and the associated account number.

Data files shall be brought to the computer room for processing only. They shall be returned as soon as possible to the library after processing.

D. Data Validity and Integrity

The integrity of a data file begins with its internal label. Label errors will not be accepted; when a label error occurs, the operator shall abort the job.

Once data has become machine readable, its validity and integrity shall continue to be checked by appropriate program controls such as label checking, edits for numeric and alphabetic fields, oversize amounts, blank fields, sequence checking, counting of records in and out of sorts, utilities, and user programs. As applicable, programmed output controls shall use exception reports listing unacceptable transactions or input records, errors, and warning messages. Aborts shall occur if critical control errors are found.

Manual output controls shall include procedures for routing of output and dismountable files, disposal of extra copies and carbons, and delivery of data and reports in a confidential and secure manner.

Generally, audit trails and control functions shall provide the input for file reconstruction.

When appropriate, manipulation of the data in a file shall result in applicable exception lists, activity reports, and other documents which will be instrumental in identifying security violations. When applicable, the following provisions shall be used to establish security controls:

  1. Logs of transactions from terminals including identity of terminal and user number.

  2. Logs of additions, updates, and deletions.

  3. Tables of users authorized to use particular systems and files.

  4. Logs of files accessed and the identification of users.

As appropriate, the production control section shall verify the proper execution of reports.

E. Privacy

Information Technology Services realizes that the increasing use of computers and information technology, while beneficial to the efficient operation of management, has magnified the potential for harm to individual privacy which can occur from collection, maintenance, use, and dissemination of personal information. It recognizes the right of privacy and, accordingly, treats all data as confidential. Further, under the directives of the Information Practices Act of 1977 and SAM section 4846.5, employees are required to bring any information which might indicate a possible infringement of the right of privacy to the attention of the Information Technology Services Assistant Vice President or the Information Security Officer when the Information Technology Services Assistant Vice President is not available.

Information Technology Services recognizes the following general principles regarding personal data:

  1. Personal data should not be collected and maintained unless it contributes to the operations and management of the University in the reasonable performance of functions for which it is legally responsible.

  2. Personal data collected by one state agency should be shared with other state agencies only to the extent that there is determined authorized need.

  3. Personal data should be protected as necessary to ensure that such data is used only for lawful purposes within the University and not made available to outside individuals or groups except as provided by law and with the proper responsible authorization.

  4. If personal data is released to outside individuals or groups by proper authorization, it should be in an anonymous form where personal identification is removed and the number of data records is sufficiently large to preclude individual identification.

  5. Personal data shall be audited periodically to ensure its continued need and accuracy. Procedures shall exist for correction of inaccuracies.

  6. The physical environments where personal data is processed and stored shall be audited with such frequency as is needed to ensure the maintenance of adequate safeguards against damage, alteration, theft, and possible penetration by unauthorized persons.

Appendix A:


Security is the concern of all CSULB computing users. Users are encouraged to use CSULB computers for legitimate educational or administrative computing. However, some users may be tempted to abuse this privilege. Any department operating computer systems is responsible for securing the systems and for informing users of expected standards of conduct:

  1. COMPLIANCE WITH SECURITY MANUAL - Users accessing CSULB computers must follow the policies published in the CSULB Security Manual. Disciplinary actions will be based upon violations as explained in the Security Manual.

  2. UNAUTHORIZED COMPUTER USE - The use of CSULB computer systems for unauthorized activities is forbidden by state law. Each user is responsible for the proper usage of the computer and must use it only for the purposes for which it was authorized. Examples of unauthorized uses are attempts to modify operating systems and applications software, access of files belonging to other users without their explicit permission, use of computers for profit, use of electronic mail to send damaging or harassing mail, physical damage to computer systems, etc.

  3. DISCONTINUANCE OF SERVICE - Provision of computing services to any user may be suspended if security violations, as described in the CSULB Security Manual, are discovered.

  4. MICROCOMPUTERS - All users must remain alert to the many security threats to personal computers, particularly those computers that are located in work areas that are accessible to the public. Staff are encouraged to question the presence of outsiders in work areas and to report any unusual occurrences to the Information Security Officer. Users of personal computers are cautioned to treat the associated data files with the same degree of care they would employ for other confidential automated and manual files.

  5. PASSWORDS - In the case of those resources protected by password, users should frequently change their password to keep someone else from accessing and tampering with their data.

  6. PRIVACY - Users should respect other usersí rights to privacy. That is, you should not access, copy, modify, or destroy the computer work of others. Each timesharing or fileserver account belongs to an individual or a department. Individual user names and passwords belong solely to the owner of the account and must not be given out to anyone else. Programs and files belong to the owner of the account containing the programs and files. They are private and confidential; only the owner can explicitly give permission for another user to access them. The same principle applies to files stored on network file servers or other electronic data storage devices. Interception of network or other communications data traffic is considered equivalent to the violation of privacy described above.

  7. COURTESY - Courtesy, kindness, and sensitivity to the needs of others should mark all use of the facilities. Insofar as possible, proficient users should be willing to help and advise less proficient users. Deliberately offensive material must not be sent or stored on the systems; e.g., obscenities, slanders, insults, demeaning, or unnecessarily embarrassing remarks or information. Users should use resources as efficiently as possible so as not to adversely impact other users. A user should not deprive other users access to the resources by attempting to crash systems, modifying standard system configurations, filling storage devices with useless data, playing computer games, deliberately loading the computer network, failing to observe time limits for the use of lab resources, etc.

  8. NETWORKS - Access to wide-area networks, such as CSUnet and the Internet, of which the University is a part, is a privilege, not a right. It is vital to the continuance of the Universityís membership in these networks that no abuses take place which reflect on our ability to use these facilities responsibly. Under no circumstances should unauthorized use be made of the computing resources at other sites. In particular, attempts to defeat the security of computer systems belonging to other institutions, and unauthorized copying of files stored on machines belonging to other institutions must not be attempted. The network should not be used in a way that limits other traffic through it. This means that only important messages should be transmitted to other sites, and that large files should be transferred at night only. Network mail and messages should not be sent to people unknown to the sender. It is poor etiquette at best and harassment at worst to send messages to strangers.

  9. ELECTRONIC MAIL - Use of electronic mail and message services should be confined to appropriate communications. Misuse of these services, including but not limited to harassment with their aid, will constitute a violation of the University policy. Authorized Computer Center personnel may access othersí files when necessary for the maintenance of the systems.

To help inspire user awareness, the following penal information is provided:


California Penal Code Section 502 states that any person is guilty of a felony who intentionally accesses or causes to be accessed any computer system or computer network for the purpose of:

  1. Devising or executing any scheme or artifice to defraud or extort.

  2. Obtaining money or property or services with false or fraudulent intent, representations, or promises.

  3. Maliciously accessing, altering, deleting, damaging, or destroying any computer system, program, or data.


If you illegally use a University computer system, you may be found:

  1. Guilty of a felony which is punishable by a fine not exceeding ten thousand dollars ($10,000), or by imprisonment in the state prison for 16, 24, or 36 months, or by both such fine and imprisonment; or

  2. Guilty of a misdemeanor which is punishable by a fine not exceeding five thousand dollars ($5,000), or by imprisonment in the county jail not exceeding one year, or by both such fine and imprisonment.

Reporting of security problems - Any person who wishes to report an unauthorized computer intrusion, or security violation, or wishes to suggest improvements should contact the Information Security Officer at extension 58357.