Category: Data Technology
Responsible Office: Information Security Office
Responsible Executive: Vice President and Chief Data Officer (VPCIO)
Date Established: March 26, 2024
Date Last Reviewed: November 25, 2025
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a comprehensive response which focuses on goals, procedures, plans, and expected outcomes, as well as organizational roles and responsibilities. The security program is a holistic approach to the university’s cybersecurity posture, and as such is approached from a broad perspective. This program will be audited and evaluated annually, according to the strategic vision of the university.
The University at Buffalo (UB, university) is committed to ensuring the confidentiality, integrity, and availability of university data. This information security program is established as a framework to protect critical university assets, data, and IT infrastructure. The goals of this Information Security Program are to:
All data, regardless of the form or format, which is created, acquired, or used in support of UB activities, must be used only for its intended purpose. Data must be protected throughout its lifecycle, from creation through disposal. All data created or collected must be classified in accordance with legal or regulatory requirements, UB policies, and/or information security best practices, as outlined in the Data Risk Classification Policy.
The information security function of UB is overseen by the Information Security Office (ISO), led by the Chief Information Security Officer (CISO). The CISO is the qualified individual responsible for the oversight and implementation of UB’s Information Security Program, and provides an annual written report on program status, effectiveness, and material risks to UB’s executive leadership. The ISO implements security controls to provide the necessary physical, logical, and procedural safeguards to accomplish those goals. The CISO is also the primary contact for SUNY relating to cybersecurity events. The ISO maintains an enterprise security plan addressing the following:
Incidents affecting information security must be reported immediately to the Information Security Office this can be done by submitting an IT Support Ticket. Formal incident reporting procedures which define the actions to be taken when an incident occurs can be found in the Protection of University Data Policy, and the universities Information Security Incident Response Plan.
Compliance with this Information Security Program is mandatory. This information security program encompasses all university data including administrative, teaching and learning, clinical and research data. Enforcement and further definitions via the UB Enterprise Information Security Plan. All members of the university community must understand their roles and responsibilities regarding information security and protecting UB’s data assets. The failure to comply with this or any other information security policy may result in punitive action as permitted by law, rule, regulation or collective bargaining agreement. UB takes every reasonable step necessary, including legal and administrative measures, to protect its data assets.
UB managers and supervisors must ensure that all information security processes and procedures within their areas of responsibility are followed. All distributed IT units within the University are subject to regular reviews to ensure compliance with information security policies and standards. Areas where compliance with the Information Security Program requirements are not met will be documented and reported to the CISO. For each area of non-compliance, a plan will be developed to address and remediate the identified deficiencies. .
Any waiver of requirements set forth in this program must be established through formal procedures, documenting in detail the justification for the waiver based on risk and business value and define either an acceptable period for expiration of the waiver or process for renewal consideration.
Category 1 Data: Restricted Data as classified by the University's Data Risk Classification Policy.
Category 2 Data: Private Data as classified by the University's Data Risk Classification Policy.
Information Criticality: Describes how valuable and important the information is in relation to the purpose and ongoing operations of SUNY. Criticality evaluates how data loss, corruption, or inaccessibility will affect SUNY's operations, standing, adherence to the law, and general functionality. SUNY criticality levels of information (Non-critical, Critical, and Mission-Critical)—are used to categorize it.
Information Sensitivity: Is the level of protection required for information because it is private or confidential. Sensitive information can include financial records, staff details, research data, and student records. Information sensitivity is classified into levels (Public, Private, Restricted) based on the possible consequences of unapproved disclosure, modification, or destruction.
Institution: Refers to a state operated campus, statutory college, or community college and all affiliates for which the campus assumes operational responsibility, as it relates to information security.
Institutional Data: Any data owned, licensed by or under the direct control of the University at Buffalo, whether stored locally or within a cloud partner.
Qualified Individual: The qualified individual can be an employee of the institution, its affiliate, or a service provider. In many cases, the institution's qualified individual will be its chief information security officer, chief compliance officer, or someone in a similar role. More important than the qualified individual's specific institutional role is that the qualified individual has the appropriate experience and authority to oversee the institution's security program, make necessary changes to that program, and report candidly to the board of directors or other governing bodies about the institution's security compliance and risks.
Risk Management: a proactive program of identifying and assessing risk, evaluating alternative strategies for risk mitigation, and making decisions about what is acceptable risk versus compensating controls.
Risk Profile: Refers to the comprehensive vulnerability of the institution information assets to potential attacks. The risk profile encompasses the identification and evaluation of diverse risks, taking into consideration variables such as the probability of security breaches and the possible repercussions on the functioning, standing, and regulatory responsibilities of the institution. It includes cyber threats, data breaches, loss of data integrity, and system delays, among other potential hazards. Constant reevaluation is necessary to account for developments in technology, threat environments, and institution operations that impact the risk profile.
Risk Tolerance: The institution's preparedness to tolerate the potential adverse repercussions of security threats in the absence of substantial measures to alleviate them. To ascertain risk tolerance, one must weigh the potential consequences of security incidents against the expense of implementing security measures. The institution 's strategic objectives, financial resources, regulatory obligations, and cultural perspectives on risk all exert an impact on it. To safeguard its information assets, a university with a low risk tolerance will allocate a greater budget towards security measures. Conversely, a university with a higher risk tolerance might be willing to take improved operational flexibility or reduced costs in return for increased risk exposure.
Sensitive Information: common term for data classified as Restricted (High Impact) or Private (Moderate Impact) security classification used by the Institution to name in aggregate the formally declared set of standards-level categories of information, such as Social Security Number, being addressed, i.e., protected, by the Program.
The implementation and application of policy and controls set out in this information security program are the responsibility of each individual department within the university. Roles and Responsibilities for Guardians of Data are as follows:
Chief Information Security Officer (CISO):
Data Administration: The responsibility for the activities of data administration, including detailed data definition, is shared among the Data Stewards, Data Managers, and the VPCIO.
Data Governance Council: Members of senior leadership who oversee institutional data systems and guide the campus data governance efforts.
Data Manager: University officials and their staff with operational-level responsibility for data management activities related to the capture, maintenance, and dissemination of data. Data Stewards may delegate data administration activities to Data Managers.
Data Owner: The University at Buffalo is the data owner of all university data; individual units or departments have stewardship responsibilities for portions of the data.
Data Steward: Assigned by Data Trustees.
Data Trustee: Senior leaders of the university (vice-presidents, vice-provosts, and deans) who have responsibility for areas that have systems of record.
Data Users: Individual with data access as granted by a Data Trustee or Data Steward.
Information Security and Privacy Advisory Committee (ISPAC):
Information Security Office (ISO): performs periodic information security risk assessments to determine vulnerabilities and initiate appropriate remediation. Responsibilities of the ISO include, but are not limited to:
Senior Management: Consisting of the university president, provost, vice provosts, senior vice presidents, vice presidents, associate vice presidents, and deans who are eligible for access to enterprise-wide aggregate and summary university data.
Vice President and Chief Information Officer (VPCIO): provides leadership for development and delivery of data technology (IT) services to the university. The VPCIO oversees an enterprise IT services organization, Computing, and Data Technology (CIT), and works in partnership with UB's schools, colleges, and administrative IT units to enable a unified and productive IT experience for students, faculty, and staff.
Vice President and Chief Data Officer
Phone: 716-645-7979
Email: cio@buffalo.edu
Information Security Office - Privacy Contact
Phone: 716-645-6997
Email: privacy@buffalo.edu
Computing, Network and Telecommunications Usage Policy
Data Risk Classification Policy
Disaster Recovery Plan
Protection of University Data Policy
UB Emergency Management’s Comprehensive Emergency Management Plan (CEMP)