Data Protection Guide

Data protection measures for GW Institutional data are outlined in this guide. When procuring software or third party services that will involve access to or use of institutional data, Faculty and Staff  are required to follow GW’s Procurement process to ensure compliance with GW privacy and security protocols.

View Physical Security Best Practices.

Contact  the GW Data Governance Office and/or GW IT ([email protected] or 202-994-4948) with questions


Physical Security Best Practices 

Physical security is the protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage to an institution. When it comes to institutional data physical security controls, faculty and staff  should follow the best practices below.

  • Restrict physical access to computers when you are away from your office or workspace. For example, locking the door or using security cables or locking devices.
  • Secure access to computers and mobile devices by requiring passwords (except for public computers with no Non-Public Information, such as those in the library or in labs).  Passwords are integral to security. Follow the GW IT Identity and Access Management Standard for selecting secure UserID passwords and how to reset them.  Log out when finished using a GW system.
  • Secure access to your computers using a screen saver or built-in lock feature when you are away from your office or work space.
  • Maintain possession or control of your mobile devices and apply appropriate safeguards to the extent possible to reduce the risk of theft and unauthorized access.
  • In the event that a GW-owned computer or mobile device containing Non-Public Information is lost or stolen, contact GW IT ([email protected]) immediately.
Applicable University Policies

 

    Data Category

    Risk Level

    Regulated

    High Risk

    Restricted

    Medium Risk

    Public

    Low Risk

    Network

    All network traffic must be encrypted in transit using at least TLS v1.1.(TLS v1.2 is strongly encouraged). 

    It’s always preferable to use the strongest cipher available when transmitting Regulated Information, especially when transmitting to a third party.

    All network traffic must be encrypted in transit using at least TLS v1.1.(TLS v1.2 is strongly encouraged).

    No limitations.       
    Workstations or
    Mobile Devices -
    GW-owned or
    approved

    (Desktop, laptop, phone,
    tablet)
    Regulated data may be accessed and processed using GW owned or approved workstations or mobile devices (such devices are configured and managed by the university and must be encrypted).
    The following security controls must be in place:
    • Strong Password
    • Encryption
    • Remote wiping capability
    • Registered and managed by the GW IT mobile device management service.
    Restricted data may be be accessed and processed using GW owned or approved workstations or mobile devices (such devices are configured and managed by the university and must be encrypted).
    The following security controls must be in place:
    • Strong Password
    • Encryption
    • Remote wiping capability
    • Registered and managed by the GW IT mobile device management service.
    No limitations.
    Personally Owned
    Devices

    (Desktop, laptop, phone,
    tablet)

    Regulated information may not be downloaded, stored or synchronized on personally owned workstations or mobile devices.

    GW Storage systems approved for regulated information may be accessed but not installed.
    Requirements for accessing regulated Information from personally owned workstations or mobile devices are:

    • Full Disk Encryption (FDE)
    • Use of VPN (Use the GW VPN when working remotely and accessing regulated data.)
    • Must be password protected
    • Anti-Virus / Anti-Spyware software must be active and maintained up to date
    • Updates for all installed software should be installed within a reasonable period
    • Firmware and driver updates should be installed within a reasonable period

    Restricted information may not be downloaded, stored or synchronized on personally owned workstations or mobile devices.

    GW Storage systems approved for restricted information may be accessed but not installed.
    Requirements for accessing restricted information from personally owned workstations or mobile devices are:

    • Full Disk Encryption (FDE)
    • Use of VPN (Use the GW VPN when working remotely and accessing restricted data.)
    • Must be password protected
    • Anti-Virus / Anti-Spyware software must be active and maintained up to date
    • Updates for all installed software should be installed within a reasonable period
    • Firmware and driver updates should be installed within a reasonable period
    No limitations
    Storage

    Regulated information may be stored only on GW IT hosted or approved servers or services (such as file sharing or collaboration services, cloud- based services, cloud-based back-up and recovery services, etc.)

    Documents containing regulated data  (excluding PHI, as defined under HIPAA) may be stored in the following GW systems:

    • GW Box
    • GW Documents (Documentum)

    Never store regulated information on laptops or mobile devices, including USB and external hard drives.

    Regulated data in physical form (paper, media) should be secured (locked) at all times and
    access should be restricted only to authorized users, with a legitimate business
    need.

    Restricted data may be stored on departmental, GW IT hosted or approved cloud-based systems.

    Documents containing restricted Data may be stored in the following GW systems:

    • GW Box
    • GW Google Drive
    • GW SharePoint
    • GW MS Teams
    • GW Documents (Documentum)

    Restricted data in physical form (paper, media) should be secured at all times and access should be restricted only to authorized users, with a legitimate business need.

    No limitations
    Access

    Access to regulated data must be limited to only authorized individuals (staff, faculty), who have a legitimate reason to access it (on a business “need to know” basis).

    Data Custodians are responsible for all access and permissions to regulated data in their custody. Data Custodians must:

    • Determine who needs access to the regulated data in their custody and what permission level needed for each individual.
    • Follow the Principle of Least Privilege: give individuals the lowest permission levels needed to perform their assigned tasks.
    • Periodically review access to the regulated data in their custody.

    Access to restricted data must be limited to only authorized individuals (staff, faculty), who have a legitimate reason to access it.

    Data Custodians are responsible for all access and permissions to restricted data in their custody. Data Custodians must:

    • Determine who needs access to the restricted data in their custody and what permission level needed for each individual.
    • Follow the Principle of Least Privilege: give individuals the lowest permission levels needed to perform their assigned tasks.
    No limitations

    Transmission

    (Emailing)

    Use only secure methods to transmit regulated information.Do not include regulated information in the body of an email or as an attachment.

    To transmit (email) regulated data to another university email address, use links instead of attachments. Store the regulated information in GW Box and email a link to the file.

    Regulated data must be encrypted during transmission outside GW network. If there is a business need to email regulated data to non-university recipients, it must be encrypted. To activate encryption of your university email account, submit a GW email Encryption Access Request to GW IT.

    Emailing regulated information to or from a personal email address is strictly prohibited.

    Use only secure methods to transmit restricted information.

    To transmit (email) restricted data to another university email address, use links instead of attachments. Store the restricted information in one of the approved storage systems listed above, and email a link to the file.

    Restricted data must be encrypted during transmission outside GW network. If there is a business need to email restricted data to non-university recipients, your email account must be encrypted. To activate encryption of your university email account, submit a GW email Encryption Access Request to GW IT.

    Emailing restricted information to or from a personal email address is strictly prohibited.

    No limitations
    Reproduction

    Avoid printing or copying regulated data.

    The minimum necessary prints / copies may be made only by permission of originator or designates. Working copies (prints) containing regulated data should be secured at all times and permanently destroyed (shredded) when no longer needed.

    Regulated data should never be printed or copied using a public (non-GW) device.

    As a general rule, employees are not allowed to take regulated data in physical form off campus (or to make unofficial copies).

    Avoid printing or copying restricted data.

    Only the minimum necessary prints / copies may be made. Working copies (prints) containing restricted data should be secured at all times and permanently destroyed (shredded) when no longer needed.

    Restricted data should never be printed or copied using a public (non-GW) device.

    As a general rule, employees are not allowed to make unofficial copies of restricted data.

    No limitations
    Disposal Regulated data must be disposed of by using GW IT approved measures, to protect against unauthorized access or disclosure.
    Regulated information must be destroyed in a manner such that the information can neither be reconstructed nor be readable.
    Restricted data must be disposed by using GW IT approved measures, to protect against unauthorized access or disclosure. No limitations