Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: USG Information Security Policy (712), inference rule therefore claim, The Board recognizes that user education is a vital part of information security (712.03.03.01) therefore (Arg Scheme: MP) The Board recognizes that user education is a vital part of information security therefore each institution shall include in its infosec plan methods for ensuring that information regarding the applicable laws, regulations, guidelines, and policies is distributed and readily available to its user community, each institution shall include in its infosec plan methods for ensuring that information regarding the applicable laws, regulations, guidelines, and policies is distributed and readily available to its user community (712.03.03.02) required to support Each institution shall develop, implement, and maintain an information security plan that is consistent with the guidelines provided by the Office of Information and Instruction Technology. (712.03.02.01), reason therefore claim, LAM of the construction of BOR Policy 712 presented according to the rules and conventions of Logical Argument Mapping (LAM), The Board recognizes that user education is a vital part of information security (712.03.03.01) therefore (Arg Scheme: MP) each institution shall include in its infosec plan methods for ensuring that information regarding the applicable laws, regulations, guidelines, and policies is distributed and readily available to its user community (712.03.03.02), For support of infosec across the system and activities between institutions Qualifier the VC for ITT shall develop and maintain an architecture for support of information security across the SYstem (712.02.01.01), The degree of protection needed is based on the nature of the resource and its intended use (712.01.01.02) Qualification BOR recognizes that information created, collected, or distributed by the USO and System Institutions is a valuable asset and must be protected from unauthorized disclosure, modification, or destruction (712.01.01.01), For support of infosec across the system and activities between institutions Qualifier the VC for ITT shall develop and maintain an information security organization (712.02.01.01), BOR recognizes that information created, collected, or distributed by the USO and System Institutions is a valuable asset and must be protected from unauthorized disclosure, modification, or destruction (712.01.01.01) therefore (Arg Scheme: MP) USO and all System Institutions have the responsibility to employ prudent information security policies, standards, and practices to minimize the risk to the integrity, confidentiality, and availability of University System information. (712.01.01.03), This is the essence of policy 712 ???? the University System Office and all System institutions shall create and maintain an internal information security technology infrastructure consisting of an information security organization and program that ensures the confidentiality, availability, and integrity of all University System information assets (712.01.02.01), BOR recognizes that information created, collected, or distributed by the USO and System Institutions is a valuable asset and must be protected from unauthorized disclosure, modification, or destruction (712.01.01.01) therefore (Arg Scheme: MP) IF BOR recognizes that information created, collected, or distributed by the USO and System Institutions is a valuable asset and must be protected from unauthorized disclosure, modification, or destruction (712.01.01.01) therefore USO and all System Institutions have the responsibility to employ prudent information security policies, standards, and practices to minimize the risk to the integrity, confidentiality, and availability of University System information. (712.01.01.03)