Responsible Office: Office of Cybersecurity | Last Review: 06/02/2021 Next Review: 06/02/2023 |
Contact: Chris Madeksho | Phone: 901.448.1579 Email: mmadeksh@uthsc.edu |
Purpose
To ensure the confidentiality, integrity, and availability of the University’s IT Resources by regulating the controlled use of Internet of Things (IoT) devices and connecting them to the appropriate University network. This standard is also designed to meet compliance requirements for data regulated by federal or state law. This includes, but is not limited to, security requirements and safeguards for the Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPAA), or Gramm-Leach-Bliley Act (GLBA).
Scope
This IT standard, and all standards referenced herein, shall apply to all members of the University community, including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
Definitions
IT Resources – Computing, networking, communications, applications, telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Internet of Things – Physical objects (e.g., vehicles, appliances, lab or medical equipment and other items embedded with electronics, software, sensors, actuators) that communicate, sense, or interact with their internal states or the external environment via network connectivity.
Standard
- In support of University functions, the Faculty/Staff must make an official request to use an IoT device or collection of devices using the Internet of Things Service Request from the ITS Service Catalog.
- Faculty/Staff IoT device requests must be reviewed and connected to the appropriate controlled network segment.
- University owned IoT devices must adhere to NISTIR 8259A IoT Cybersecurity Capability Core Baseline.
- IoT devices must comply with all University information security standards such as, but not limited to, Network Security, Access Control, Data & System Classification, Vulnerability Management, and Password Management.
- IoT networks must be monitored to identify abnormal traffic and emergent threats.
References
- RM-002-Vulnerability Management
- SC-001-Network Security
- IoT Device Cybersecurity Capability Core Baseline (nist.gov)
- Internet of Things Service Request Form