Asset Management

Quick Start Guide for Domain 4

Safeguards for Domain 4
Information Security & Privacy Program

An asset is anything that has value. This includes not only the university's physical information technology equipment, but also its information, software, reputation, people, and services. It is important to identify, classify, track, and assign ownership for the most important assets related to information security and information privacy, to ensure they are adequately safeguarded.

Standards-based expectations for this DomainIU's Implementation of Safeguards for this Domain

Responsibility for Assets

Ideally all assets would be tracked by an organization. However, it is usually too costly to track and assign ownership to every asset. Instead, an organization typically tracks those assets that are of importance to the institution. An asset's importance can be based on a number of factors, including its sensitivity, criticality, value, or the compliance requirements placed upon it. Important assets should have an assigned owner responsible for establishing and maintaining appropriate safeguards to protect those assets.

Every member of the Indiana University community has some responsibility and accountability for the security and privacy of data and information. Because operations at Indiana University are distributed, the ultimate responsibility and accountability for handling information appropriately rests with the unit and individual responsible for collecting, storing, manipulating, transmitting, or otherwise handling the information.

Information Assets

In order to identify which information assets are of importance to the institution and thus require tracking and protection, a data classification scheme is used. See the Information Classification section below for more information. The university's Committee of Data Stewards is responsible for establishing the classification levels, for classifying institutional data elements, and for establishing policies and standards that safeguard the university's institutional data.

University units that use information not under the purview of the Committee of Data Stewards must be aware of applicable legal, contractual, regulatory, policy, and compliance requirements that govern the information, and ensure important information elements are classified appropriately.

The Indiana University Intellectual Property Policy outlines who owns patentable and copyrightable information assets. For assistance in technology commercialization and the IP issues associated with such activities, see the Indiana University Research & Technology Commercialization Corporation.

The University Information Security Office (UISO) provides a site license to Identity Finder as a tool to help individuals and units discover sensitive data on workstations, storage devices, servers, and Web servers, so the data can be securely disposed of or protected.

Data owners and handlers should strive to provide accurate, complete, up-to-date, and relevant information for the purposes identified in order to minimize the chance of inappropriate information being used in the conduct of university business, and especially for decisions about individuals. When feasible, individuals are informed that they are responsible for providing the organization with accurate, complete, and up-to-date personal information, and for contacting the organization if correction of such information is required.

Physical Assets

Physical assets are determined to be of importance to the institution when they have an acquisition value of at least $5,000 and a useful life expectancy of one year or more, as defined in Policy I-170 below.

It is important to note that physical assets also may inherit their importance from the information stored or processed in or on them. If those information assets are classified at a level that requires tracking, then the physical asset does as well.

Empowering People Strategic Plan, Recommendation 5 contains Action 17d which highlights Indiana University's need for a central asset tracking product, within which risk assessment surveys can be coordinated.

Information Classification

Information — like other assets — should be classified based on its sensitivity, criticality, value, or the compliance requirements placed upon it. Such an approach can help guide inventory and risk management approaches for other assets that store or process the university's information.

The university's Committee of Data Stewards is responsible for classifying the university's institutional data. In