Information and information systems are strategic assets of the University System of Georgia (USG). The Board of Regents (BOR) recognizes that information created, collected, or distributed using technology by any USG organization is a valuable asset and must be protected from unauthorized disclosure, modification, or destruction. Therefore, Georgia Highlands College establishes its information security program through the Information Security unit of Information Technology (IT). This unit of IT is responsible for creating and maintaining a comprehensive set of security safeguards for data, systems, and information technology resources through the use of policies, information security architectures, and operational controls. Implementing the appropriate security measures on every system protects the confidentiality, integrity, and availability of data and is critical to ensuring continuity of operations. The degree of protection needed by each system is based on the nature of the system and its intended use. However, all institution security controls and policies must be implemented in compliance with state and federal law, the USG IT Handbook, and all other applicable USG policies and procedures.
What is Information Security?
Information security, commonly called cybersecurity, is the practice of protecting information and information systems from unauthorized access, unintentional disclosure, unapproved modification, disruption, and/or destruction.
Why is this important?
- Violation of GHC’s Information Security policies can result in disciplinary action up to and including termination for employees and expulsion for students.
- Inappropriate data handling practices can be a violation of federal or state law and result in the loss or unintentional exposure of confidential data.
- Information security incidents can result in service outages, equipment damage, cause reputational damage to the institution, and expose students, employees, alumni, and guests to an increased risk of identity theft.