Defined Terms Glossary
Terms |
Definition |
Access Custodian | A university employee responsible for implementing controls specified by the policy and the Data Custodian. They oversee appropriate processing, storage and transmission protocols for information. |
Bring Your Own Device (BYOD) |
Refers to personally owned endpoints used to connect to and access University Information Systems |
Conditions of Use | Restrictions around permitted use of information by Data Users or acceptable circumstances for encountering data. |
Confidential Data |
Information deemed private or confidential by applicable law and other highly sensitive data intended for limited, specific use by university personnel with a legitimate need to know. Explicit authorization by the Data Steward is required to access Confidential Data. Unauthorized disclosure could have a profound adverse impact on the business or research functions of the University or affiliates, the personal privacy of individuals, or compliance with federal or state laws and regulations or University contracts. Confidential Data have a very high level of sensitivity. Examples include:
|
Institutional Data | Information, regardless of medium, is generated, collected, stored, maintained, transmitted, enhanced, or recorded by or for the university to conduct university business. It includes data used for planning, managing, operating, controlling, or auditing university functions, operations and mission. Examples of Institutional Data include student records and demographic information, employee records and demographic information, and budget and finance data. It does not include data generated by research (governed by the office of VPR) or data owned or generated by a party outside the university when used in research, conducted at the university, under the auspices of the university, or with university resources. |
University Data |
Any data related to university functions that are:
|
Data Manager | Individuals authorized by a Data Steward to provide operational management of a University Data collection. The Data Manager will maintain documentation pertaining to the data collection (including the list of those authorized to access the data and access audit trails where required), manage data access controls and ensure security requirements are implemented and followed. |
Data Custodian | Data Custodians are accountable for the oversight and general operation of institutional data systems that serve a broad section of the university community. It is the responsibility of the Data Custodians to provide direct authority and control over the management and use of institutional data in their area of responsibility, regardless of which system the data resides in. |
Data Stewards |
Deans, associate vice presidents, and heads of academic, administrative, or affiliated units or their designees with responsibility for overseeing a collection (set) of University Data. They are, in effect, the owners of the data and, therefore, ultimately responsible for its proper handling and protection. Data Stewards are responsible for ensuring the appropriate classification of data and data collections under their control, granting data access permissions, appointing Data Managers for each University Data collection, making sure people in data-related roles are adequately trained, and ensuring compliance with all relevant policies and security requirements for all data for which they have responsibility. |
Data Processor |
Individuals authorized by the Data Steward or designee and enabled by the Data Manager to enter, modify, or delete University Data. Data Processors are accountable for the completeness, accuracy, and timeliness of data assigned to them. |
Data Viewer |
Anyone in the university community with the capacity to access university data but is not authorized to enter, modify or delete it. |
Electronic Communications |
Refers to the use of Information Systems for transmitting, receiving, storing, or posting information via email, message boards, forums, chat platforms, websites, institutional social media accounts, or other electronic tools over the Internet or other networks. |
Endpoints |
This includes desktops, laptops, tablets, mobile devices, printers, or any device (excluding servers) capable of connecting to the university network or accessing university data. |
Information Assets |
Any university-owned, controlled, leased, protected or authorized information or data. |
Information Technology Resources |
Technology and/or computer resources provided or sanctioned by the university, including workstations, servers, mobile devices (laptops, tablets, smartphones, etc.), printing equipment, all associated peripherals and software, and other information technology platforms and systems. These resources are used for administration, research, teaching, or other purposes, and access to university information, systems, data, or networks must occur exclusively on University-owned or approved devices. |
Information Systems |
Encompasses endpoints, networks, servers, licensed platforms, services, cloud environments, and similar devices or software administered, owned, controlled or operated by the university or for which the university is responsible. |
Multi-Factor Authentication
|
An authentication method that requires users to provide two or more verification methods to gain access to University Information Technology Resources. |
Networks |
Encompasses wired and wireless video, voice and data infrastructure, including security devices. |
Operational Data |
Information is not shared publicly but is not subject to specific protection requirements. It is intended for designated university workgroups or departments. Examples include PII, budget information, and internal emails. |
Personal Information, Personal Data, or Personally Identifiable Information (PII)
|
Any information that can be used to identify a specific individual. Two components are direct identifiers (name, student ID, driver’s license number, SSN, passport number, etc.) and indirect identifiers (DOB, place of birth, race, gender, medical/health information, financial information, educational records, etc.). Indirect identifiers cannot identify an individual directly by themselves, but when combined with direct identifiers or other indirect identifiers, can cross thresholds where they become PII. The complete list includes but is not limited to the following:
|
Privileged Accounts |
A local administrator, domain administrator, data access administrator, or application administrator account is present or used in a university system. These roles commonly have elevated privileges, such as the ability to modify security controls, create user accounts or modify user access. |
Public Data |
Information intentionally made available to the public by valid authority without potential harm to the university or its affiliates. |
Regulations, Laws, and Standards
|
Governing federal, state, and local statutes, regulations, rules, policies and standards such as CUI, HIPAA, PCI, FERPA, GLBA, and export control regulations affecting data protection. |
Removable Media |
Devices or media readable and/or writable by end users that can be moved between computers without modification. |
User |
Refers to a person, whether authorized or not, who makes use of university information technology resources from any location. |
University or K-State |
Refers to Kansas State University, including all its campuses, colleges, controlled affiliates and enterprises, divisions, offices, departments, and other units. |
University Data |
Data created, received, collected, transferred, and/or maintained for university use for administrative, academic, and research purposes. |
University Use |
Refers to the authorized use of university resources—including administrative, academic, research, and operational resources—by individuals such as employees, volunteers, contractors, or affiliates for activities necessary, optional, or convenient to their roles and responsibilities in support of the University's mission. |
University Devices |
Any device purchased with university or philanthropic funds is capable of connecting directly to university networks or through a gateway. Examples include desktops, laptops, tablets, printers, IoT devices, servers, appliances and sensors. |