Information Resources
Information Resources > Sensitive Information Policy
Information Resources > Sensitive Information Policy
Principle
The University of Kansas Medical Center has a responsibility for securing sensitive information against intentional or unintentional disclosure, alteration or loss of availability.
Purpose
The purpose of this policy is to minimize the risk that sensitive KUMC information is compromised or disclosed inappropriately.
Resources Covered By This Policy
All electronic and paper information systems including (but not limited to) the central administrative systems (financial, HR/payroll, student); department administrative systems (including "shadow" financial systems and vendor-managed systems); file servers; email servers; web servers; desktop and mobile computers; and all paper-based information storage and retrieval systems.
Individuals and Groups Covered By This Policy
All KUMC faculty, staff, and students, and anyone else accessing, using, or storing sensitive KUMC information.
Exemptions
This policy applies to everyone at all campuses and sites of the University of Kansas Medical Center. There are no exemptions.
Definitions
Data owner: is the person(s) or department identified with and widely recognized as having primary authority and decision responsibility over a collection of University data. The data owner may be responsible for an entire database or a segment of the database. For example, the Registrar is responsible for all student data, while the Director of Financial Aid is only responsible for the financial aid data within the records. Data owners are frequently referred to as data stewards.
Personal identity information (PII): includes Social Security Numbers, credit card numbers, bank and credit union account numbers, health insurance plan identification numbers, drivers license numbers, dates of birth, and other similar information associated with an individual student or employee that, misused, might enable assumption of that individual's identity ("identity theft") to compromise that person's personal or financial security.
Protected health information (PHI): includes health information that is associated with at least one of eighteen identifiers that make the information "individually identifiable." The eighteen identifiers include name, address, SSN, date of birth, date of health care, and other elements listed in Appendix A of the KUMC's HIPAA Policy on Research using Electronic Protected Health Information. Health information about groups of people (population data, mean and median data, aggregate data, etc.) that cannot be related to individuals is not PHI.
Student educational record information: includes records that are based on student status and maintained by the University or a party acting for the University. Access to student records is governed by the KU Student Records Policy and the Family Educational Rights and Privacy Act (FERPA). Sole possession records, medical or psychological records, alumni records, employment records, and law enforcement records are not considered student educational records and not subject to FERPA.
Other sensitive information: includes any information that has been designated by the University to be non-public information but is not protected by law or regulation. Examples include personnel records (including performance appraisal information and records of disciplinary action); information about KUMC security systems; computer passwords; and information about the configuration of KUMC electronic systems.
For a detailed guide on the specific information that is considered to be sensitive information, refer to the guideline document titled "What is Sensitive Information?"
Responsibilities
Data Owners are responsible for evaluating and classifying the sensitivity of the data for which they are responsible, defining protection requirements for the data based on legal or regulatory requirements, and defining requirements for access to the data.
I. Guidelines for Handling Sensitive Information
When working with sensitive information, you should always:
In addition, if you cannot avoid storing documents containing sensitive information on your personal computer drives, then the personal computer must be "certified". Contact the Department of Information Security (8-0966) for information about personal computer certification.
Physical access to paper documents containing sensitive information should be restricted to those who need the information to perform their responsibilities. Appropriate physical security, including door and cabinet locks, must be implemented.
When working with sensitive information, you should never:
II. Guidelines for Identifying Individuals in Electronic Systems
The Employee Identification Number (EmplID) generated by the PeopleSoft Human Resources/Payroll systems is the preferred unique identifier for all KUMC employees including affiliated groups not paid from state sources (Research Institute, Endowment Association, Student Union Corporation, KUPI employees in the context of state-related activities). Affiliated groups will be put into the Human Resources/Payroll system as appropriate in order to create an EmplID (and, thus, to facilitate identity-driven processes such as account creation and termination, portal access, and library access).
The PeopleSoft Human Resources/Payroll system is the authoritative source of employee Social Security Numbers and the only system in which an individual employee's name, EmplID, and SSN should be associated.
The KUID is the preferred unique identifier for all KUMC students. The PeopleSoft Student Administration System is the authoritative source of student Social Security Numbers and the only system in which an individual student's name, EmplID, and SSN should be associated.
When the EmplID and KUID cannot be used (as, for example, in a purely numeric field), the University Employee Badge ID number is a satisfactory replacement.
No new information systems that use the SSN for personal identification will be acquired, developed, or implemented unless that use is mandated by federal or state regulation. Existing information systems reliant on the Social Security Number for personal identification will be modified or replaced in the context of a logical system of priorities (to be developed by the Department of Information Resources) and resource availability.
The SSN should be removed from all University online and paper forms and reports except where required by federal or state regulation.
Enforcement
Suspected or known violations of this policy will be reported to the appropriate University officials, and may result in:
Suspected or known violations of University regulations and/or State and Federal law will be processed by the appropriate University authorities and/or law enforcement agencies.
Contact information
For information on this policy, please contact:
Sherry Callahan
Director of Information Security
Department of Information Resources
University of Kansas Medical Center
1020 Taylor, 3901 Rainbow Blvd
Kansas City, Kansas 66160
(913) 588-0966
Steffani Webb
Associate Vice Chancellor for Information Resources
Chief Information Officer (Interim)
University of Kansas Medical Center
1018 Taylor, 3901 Rainbow Blvd
Kansas City, Kansas 66160
(913) 588-7300
Karen Blackwell
Director, HIPAA Compliance and Human Research Protection Program
University of Kansas Medical Center
G006 Sudler, 3901 Rainbow Blvd
Kansas City, Kansas 66160
(913) 588-0942
Last Review Date: March 13, 2011
Last Revision Date: May 18, 2011