Information Security

 Welcome

Welcome!. El Paso Community College is committed to protecting information resources that are critical to its academic mission as well as preserving an environment that encourages collaboration through the responsible use of information technology resources. Everyone at El Paso Community College has a responsibility for proper handling and protection of confidential information and responsible use of information technology.  

 

Your source for clarification of information security issues is the Information Security Office.  We are here to help.

 

Information Security Program Logo

Gabriela Ferron, Administrative Assistant

831-6480

gferron@epcc.edu

Cheryl Bowman, ERP Security Analyst

831-6574 

cbowman@epcc.edu

Dr. Jenny Girón, Interim Chief Information Security Officer, VP, IT/CIO

831-6571

 jgiron6@epcc.edu


For issues needing immediate attention, call the IT Service Desk at (915) 831-6440.

 

 Mission Statement

The mission of the Information Security Office is to foster a safe computing environment by assisting the EPCC community in protecting the confidentiality, the integrity, and the availability of information resources.

By working with the EPCC community, the Information Security office will:

  • Advance the awareness that information security is the responsibility of everyone.
  • Work toward ensuring all applicable regulations regarding the security of information are followed.
  • Perform risk assessments of department workflows and data and manage identified threats through mitigation strategies.
  • Team with EPCC’s data owners, experts in the field, and industry leaders to understand the current and future threats to information.
  • Develop and update the policies, procedures, and guidelines necessary to ensure the confidentiality, the integrity, and the availability of EPCC’s information resources.

 

 Procedures & Handbook

College procedure 2.05.01.54 (PDF)  Acceptable Use of Information Resources Procedure provides guidance on the proper use of EPCC information resources. For questions about the appropriateness of a particular behavior or activity, start with this procedure.

 

College procedure 2.05.01.10 (PDF) Employee/Client Access to Computerized Administrative Data outlines the procedural steps to be taken to request access to data stored in computerized files and databases.

 

College procedure 2.05.01.14 (PDF) Security of Centralized Computerized Administrative Data provides guidelines to aid in securing all computerized administrative data stored at Information Technology (IT) central data processing facility from unauthorized access.

 

College procedure 2.05.01.58 (PDF) Information Security Procedure guides students, faculty and staff in providing information security protection to El Paso Community College Information Resources. All computer systems, networks, network connections, hardware and software are the property of El Paso Community College.

 

College procedure 2.05.01.66 (PDF) Access Management: Employee Separations and Absences establishes guidelines for ending or suspending an employee’s Information Resource (IR) accounts and ending their access to EPCC systems.

 

College Procedure 2.05.01.74 (PDF) Use of Employee E-mail as Official Mode of Communication and 2.05.01.78 (PDF) College Procedure Use of Student E-mail as Official Mode of Communication provide guidelines for the access to and use of the college's e-mail system.

 Security Links

Awareness
Common sense tells us that awareness is the key to being able to comply with EPCC, state and federal guidelines for protecting student and institutional information.

 

Business Continuity
Business continuity deals with keeping a department and an institution in business after a disaster has been experienced and takes a lot more into account than just technology.

 

Information Privacy
The value of information as an institutional resource is increased and its accuracy maintained through its appropriate use and protection.

Risk Assessment
Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated.

 

Reading Room
Computer Security Resource Center of the National Institute of Standards and Technology.

 

Standards
Protecting Your Password Standard. Review this presentation to learn password basics!

Safe Computing
With these tips, you can help minimize the possibility of losing data and/or access.

Password Strength

Make your password secure.