Information Security

 Welcome

Welcome to the Information Security (InfoSec) Program's Web presence. This area is dedicated to enhancing all aspects of security for every category and use of information at El Paso Community College.

 

Each day brings new threats to EPCC computer users as cybercriminals try to invade our network and gather sensitive personal and financial information. What do they find valuable? Your name, Social Security Number and EPCC-ID, your date of birth, username and password.

 

Your source for clarification of information security issues is the Information Security Office.  We are here to help.

Information Security Program Logo

Cheryl Bowman, Information Security Risk Advisor

831-6574 

cbowman@epcc.edu

(Vacant), Chief Information Security Officer

831-6411

 


For issues needing immediate attention, call the IT Service Desk at (915) 831-6440.

 

Learn more


 Mission Statement

The mission of the Information Security Office is to foster a safe computing environment by assisting the EPCC community in protecting the availability, the integrity, and the confidentiality of information resources.

 

By working with the EPCC community, the InfoSec office will:

  • Advance the awareness that information security is the responsibility of everyone
  • Work toward all applicable regulations regarding the security of information are followed
  • Perform risk assessments of department workflows and data and manage those threats through mitigation strategies
  • Team with EPCC’s data owners, experts in the field, and industry leaders to understand the current and future threats to information
  • Develop and update the policies, procedures, and guidelines necessary to ensure the availability, the integrity, and the confidentiality of EPCC’s information resources

 

 

 Procedures & Handbook

The Acceptable Use of Information Resources Procedure 2.05.01.54 (PDF) provides guidance on the proper use of EPCC information resources. Should a user ever have a question about the appropriateness of a particular behavior or activity, this procedure should be the first reference to check.

 

Another useful resource is the Information Security Handbook (PDF). This handbook contains common sense tips and "best practices" for securing information.

 

For further information regarding information security responsibilities, please read the Information Security Procedure 2.05.01.58 (PDF)

 

 

 Forms

Administrative Banner Requests 

Administrative Banner Request Instructions

Administrative Banner Request Form (PDF)

 

BDMS Imaging Access Requests

BDMS Access Request Form (PDF)

 

ODBC Access Requests

ODBC Access Request Form (PDF)

 

VPN Account Requests

VPN Account Request Form (PDF)

 

For more forms, please go to the EPCC District Forms page.


 Security Links

Awareness
Common sense tells us that awareness is the key to being able to comply with EPCC, state and federal guidelines for protecting student and institutional information.

 

Business Continuity
Business continuity deals with keeping a department and an institution in business after a disaster has been experienced and takes a lot more into account than just technology.

 

Information Privacy
The value of information as an institutional resource is increased and its accuracy maintained through its appropriate use and protection.

Risk Assessment
Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated.

 

Reading Room
Computer Security Resource Center of the National Institute of Standards and Technology.

 

Standards
Protecting Your Password Standard. Review this presentation to learn password basics!

Safe Computing
With these tips, you can help minimize the possibility of losing data and/or access.

Password Strength

Make your password secure.