Skip to main content

JSU CYBER AWARENESS

THIRD PARTY VENDOR SECURITY POLICY

 

Abstract: 
JSU must protect and control access to the sensitive Data it creates, collects, stores and process in paper, and electronic  formats in accordance with all applicable federal and state laws and university policies.

Policy Number: 50000.023
Effective Date: 5/25/2020
Review/Revised Date: 3/16/2023 
Category: Information Technology
Policy Owner: CIO/Information Technology
Policy Contact: CISO/Information Technology

 

Policy Statement

The purpose of this policy is to establish rules and operating parameters for third party vendors’ access to University critical information, their operator responsibilities, and protection of Jackson State University’s assets, data, and PII.  This policy supports compliance with federal and state data privacy laws.

Definitions

    • PII- Personally Identifiable Information can include information such as phone numbers, social security numbers, credit or bank account numbers, and addresses.
    • Passphrase- A passphrase is a longer version of a password and is, therefore, more secure. A passphrase is typically composed of multiple words. Examples include “It’s time for vacation” or “block-curious-sunny-leaves

 Employee Adherence

This policy applies to all JSU employees, contractors, consultants, internal and external vendors, including all personnel affiliated with third parties who access and use JSU services through resources it provides such as the JSU Website(s), and Mobile Apps, etc.

Policy

General Policy

Prior to entering into any agreement or contract, Jackson State University employees shall follow due diligence in selecting third party vendors. Third parties must comply with all applicable state procurement, JSU policies, practice standards, and agreements as well as any binding legislation at the state and federal levels. This policy supports law in certain areas but shall not replace any potential changes in current or future compliance components levied against third party vendors through statute, law, or contract.

 General Vendor Responsibilities

  • Third party vendors shall provide JSU a point of contact for contract terms and service offering implementation. A JSU point of contact will work with the third party vendors to ensure the vendor is in compliance with all state and federal laws as well as this policy.
  • Vendors must also ensure that the latest patches are installed
  • Vendor supplied software vulnerabilities are addressed as soon as possible

Third Party Security Controls

  • JSU employees, vendors and contractors should not use the same password for JSU accounts as passwords for access to other non-JSU accounts (e.g., personal ISP account, benefits, etc.).
  • Data and personnel confidentiality terms shall protect all JSU Confidential Information and PII.
  • Service providers shall provide JSU with a list of all staff working on the contracted services. The list shall be updated and provided to JSU within twenty-four (24) hours of staff changes.
  • Ensure industry acceptable application development security standards (e.g. OWASP) are followed so that IT systems and applications are tested and secured in every step of the application and system development life cycle.
  • Ensure firmware, software and application source code are validated and tested against vulnerabilities and weaknesses before deploying to production.
  • Password fields should display only masked characters as the user types in their password, where technically feasible.
  • Service provider access shall be uniquely identifiable and password/access management must comply with all JSU requirements
  • Vendor data privacy and information security procedures and protocols shall be made available and meet JSU’s requirements for the return, destruction, or disposal of information in the service provider’s possession at the end of the agreement.
  • The service provider shall only use JSU’s information and systems for the purpose of the direct business agreement. No other uses are allowed unless expressly granted in writing by JSU.

Third Party Operation Management

  • Providers who provide infrastructure and platform hosting services should ensure non-JSU authorized personnel cannot physically or electronically inspect, insert, share, access, steal or change content JSU’s assets, including without limitation JSU’s used network, traffic, infrastructure, applications, RAM and storage space.
  • Data destruction processes should follow a process that securely wipes all data on all media using a method that will not allow data to be retrieved. For all IT systems that access Regulated, Confidential, or Personal Information, JSU requires the destruction be performed in accordance with NIST Special report 800-88.

Third Party Compliance (Credit Card Data)

    • Vendors should secure all Credit Card data in accordance to requirements listed in the most current and release editions of the Payment Card Industry – Data Security Standards (PCI-DSS or PCI).
    • Vendors should use additional security protection controls for protecting against access to JSU’s Regulated, Personal, or Confidential information, such as:
    • Web application firewalls, intrusion detection and protection systems, data loss prevention systems, strong passphrases, patch management and updates etc.

Policy Compliance

  • Any JSU employee, vendor(s) and contractor(s) found to have violated this policy may be subject to disciplinary action, up to and including revocation of access privileges, or termination of contract or employment.  In addition to University discipline, users may be subject to criminal prosecution under federal, state or local laws; civil liability or both for unlawful use of any IT System.

  Related Standards, Policies, and Processes

  • Password Policy 50000.021
JSU CYBER AWARENESS

Location

1400 John R. Lynch Street
Student Center
Jackson, MS 39217-0280

Phone: 601.979.2241