The Stanislaus State Information Security Policy comprises policies, standards, guidelines, and procedures pertaining to information security. The information contained in these documents is largely developed and implemented at the CSU level, although some apply only to Stanislaus State or a specific department.
Email and Phishing Scams
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Spear phishers distribute malware in emails or breach your account to steal personal and organization information. 91% of data security breaches start with an email attack.
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Check out this 2:28 minute training video on email phishing and how to protect your personal information and the campus data security.
Phishing is a method of trying to gather personal information using deceptive e-mails and websites.Spear phishers distribute malware in emails or breach your account to steal personal and organization information. 91% of data security breaches start with an email attack.
These attacks are easier to spot once you know what to look for. Be on the lookout for the following indicators of a malicious email:
- Email is from a sender you don't recognize
- Message is unexpected or unsolicited
- Sender's organization name doesn't match the email address domain
- Subject of the email uses emotional topics, urgent deadlines for response, too-good-to-be-true claims, or tries to scare you
- Contains spelling or grammar mistakes
- Asks you to download an attachment, enter personal information such as a password or social security number
Spam is not the same thing as a phishing email. Spam is unsolicited commercial email, often delivered to a large number of individuals. Phishing is an active attempt to get you to click a dangerous link, download a file infected with malware, or enter personal information such as passwords or social security numbers. Spam can blocked or deleted, but phishing emails should be reported.
Preview emails in Outlook before opening and look for these three elements:
When an attachment comes from someone you don't know or if you weren't expecting the file, make sure it's legitimate before opening it.
Spear phishers will often forge log-in pages to look exactly like the real thing in order to steal your credentials.
Roll your mouse pointer over the link and see if the URL that pops up matches what's in the email message. If they don't match, don't click.
If you see something that looks off, don't open or click the message. Contact the OIT Technology Support Desk at firstname.lastname@example.org and report the email. You can also use the PhishMe Report Phishing button in newer versions of Outlook to submit a suspected phishing attempt to OIT. Even if you aren't sure, contact OIT to check it out. Better safe than sorry.
This phishing email was sent to campus in April as an educational campaign. It relied on curiosity to prompt viewers into clicking the active link. If this had been a real phishing attempt, clicking the link could have stolen personal data from the viewer, or uploaded malware into the campus network. Always stop and think before clicking a link, and always contact OIT if you suspect a phishing attempt.
Contact the OIT Technology Support Desk at email@example.com and report the email.
To learn more about the Stanislaus State CoFense Email Security Initiative: CoFense Implementation Plan Summary May 2018.pdf
Policies, Procedures, and Standards
To access the details of a specific policy, click on the relevant policy topic in the table below. You can also navigate to the relevant Supplemental Policies, Standards, and Guidelines and Procedures by clicking on the appropriate ► in the table; where more than one document of a particular type is associated with a particular topic, clicking the ► will open a separate web page with links to relevant documents.
Note that, to access documents linked from the Guidelines and Procedures columns below, you'll need an active Warrior ID and Password
Learn about the email security initiative at Stanislaus State CoFense Implementation Plan Summary May 2018.pdf
Application Service Provider Security Requirements.pdf
Computer Crime and Privacy Laws.pdf
Computer Crimes and Privacy Laws Cheat Sheet.pdf
Data Network Wiring Standards.pdf
Electronic Data Disposition.pdf
Email and Campus Communication.pdf
Information Classification and Handling.pdf
Information Classification Cheat Sheet.pdf
Information Security Awareness Training.pdf
Information Security Incident Management.pdf
Information Security Program.pdf
Patching and Malicious Code Management.pdf
Payment Card Industry Data Security Standard PCI_DSS Summary.pdf
Risk Assessment Questionnaire.xls
Risk Assessment Inventory Server.xls
Risk Assessment Worksheets.xls
Telephony Rules and Policies.pdf
Vulnerability Management and Assessment.pdf
Web Application Development.pdf
Data Classification Guidelines
This document describes the three levels of data classification that the University has adopted regarding the level of security placed on the particular types of information assets. The levels described below are meant to be illustrative, and the list of examples of the types of data contained below is not exhaustive. Please note that this classification standard is not intended to be used to determine eligibility of requests for information under the California Public Records Act or HEERA. These requests should be analyzed by the appropriate legal counsel or administrator.
Access, storage and transmissions of Level 1 Confidential information are subject to restrictions as described in CSU Asset Management Standards.
Information may be classified as confidential based on criteria including but not limited to:
- Disclosure exemptions - Information maintained by the University that is exempt from disclosure under the provisions of the California Public Records Act or other applicable state or federal laws.
- Severe risk - Information whose unauthorized use, access, disclosure, acquisition, modification, loss, or deletion could result insevere damage to the CSU, its students, employees, or customers. Financial loss, damage to the CSU’s reputation, and legal action could occur.
- Limited use - Information intended solely for use within the CSU and limited to those with a "business need-to know."
- Legal Obligations - Information for which disclosure to persons outside of the University is governed by specific standards and controls designed to protect the information.
Examples of Level 1 - Confidential information include but are not limited to:
- Passwords or credentials that grant access to level 1 and level 2 data
- PINs (Personal Identification Numbers)
- Birth date combined with last four digits of SSN and name
- Credit card numbers with cardholder name
- Tax ID with name
- Driver’s license number, state identification card, and other forms of national or international identification (such as passports, visas, etc.) in combination with name
- Social Security number and name
- Health insurance information
- Medical records related to an individual
- Psychological Counseling records related to an individual
- Bank account or debit card information in combination with any required security code, access code, or password that would permit access to an individual's financial account
- Biometric information
- Electronic or digitized signatures
- Private key (digital certificate)
- Law enforcement personnel records
- Criminal background check results
Access, storage and transmissions of Level 2 - Internal Use information are subject to restrictions as described in CSU Asset Management Standard.
Information may be classified as "internal use" based on criteria including but not limited to:
a) Sensitivity - Information which must be protected due to proprietary, ethical, contractual or privacy considerations.
b) Moderate risk - Information which may not be specifically protected by statute, regulations, or other legal obligations or mandates but for which unauthorized use, access, disclosure, acquisition, modification, loss, or deletion of could cause financial loss, damage to the CSU’s reputation, violate an individual’s privacy rights, or make legal action necessary.
Examples of Level 2 - Internal Use information include but are not limited to:
Identity Validation Keys (name with)
-Birth date (full: mm-dd-yy)
-Birth date (partial: mm-dd only)
Photo (taken for identification purposes)
Library circulation information.
Trade secrets or intellectual property such as research activities
Student Information-Educational Records not defined as "directory" information, typically:
-Educational services received
Location of critical or protected assets
Vulnerability/security information related to a campus or system
Campus attorney-client communications
-Employee net salary
-Personal telephone numbers
-Personal email address
-Pre-employment background investigations
-Mother’s maiden name
-Race and ethnicity
-Parents’ and other family members’ names
-Birthplace (City, State, Country)
This information is designated as publically available and/or intended to be provided to the public.
Information at this level requires no specific protective measures but may be subject to appropriate review or disclosure procedures at the discretion of the Unviserity in order to mitigate potential risks.
Disclosure of this information does not expose the CSU to financial loss or jeopardize the security of the CSU’s information assets.
Examples of Level 3 - Publicly Available
- Warrior ID (Emplid, Student ID)
- Employee Information
- Employee Name (first, middle, last; except when associated with protected information)
- Work email address
- Work mailing address
- Office Location and telephone number
- Gross Salary
- Signature (non-electronic)
- Financial budget information
- Purchase order information
- Student Information (Non-FERPA restricted students only)
- Participation in sports/activities
- Weight and height (athletic team members only)
- Dates of attendance
- Full or part-time status
- Degrees and awards received
- Campus email address
- Most recent or previous college/university/agency attended
Updated: March 29, 2023