{"id":1645,"date":"2024-08-05T17:22:26","date_gmt":"2024-08-05T17:22:26","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1645"},"modified":"2024-09-05T16:06:49","modified_gmt":"2024-09-05T16:06:49","slug":"pm-2-information-security-program-role","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/pm-2-information-security-program-role\/","title":{"rendered":"PM-2: Information Security Program Role"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">PM-2: Information Security Program Role<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>DIR Required By:<\/strong> &nbsp;07\/20\/2023&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Review Date: &nbsp;<\/strong>07\/31\/2024&nbsp;<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>As stated in TAC \u00a7202, the Tarleton Chief Information Security Officer (CISO) has the explicit authority and responsibility to administer the information security requirements of TAC \u00a7202 university-wide.&nbsp; The CISO is also responsible for helping ensure compliance with the requirements outlined in Texas Government Code <a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/GV\/htm\/GV.2054.htm#2054.136\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a72054.136<\/a> and Texas A&amp;M University System (TAMUS) <a href=\"https:\/\/policies.tamus.edu\/29-01-03.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Regulation 29.01.03, Information Security<\/a>. &nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>The CISO shall be responsible for ensuring that an appropriate information security program for the university is in effect and that compliance with TAC \u00a7202 is maintained for information resources that are in the possession or under the control of individuals (i.e. information resource owners, custodians, or users) by virtue of their employment or affiliation with Tarleton.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>The CISO is responsible for the development of university information security rules, standard administrative procedures, and security controls.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>The CISO is responsible for and has authority to monitor compliance with university information security rules, standard administrative procedures, and security controls (e.g. risk assessments).&nbsp;<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>References\/Additional Resources<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=21#:~:text=(a)%20Each%20state%20agency%20shall,of%20Texas%20Government%20Code%20%C2%A7%202054.136.\" target=\"_blank\" rel=\"noreferrer noopener\">1 TAC \u00a7 202.21<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=71#:~:text=(a)%20Each%20institution,Government%20Code%20%C2%A7%202054.136.\" target=\"_blank\" rel=\"noreferrer noopener\">1 TAC \u00a7 202.71<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/GV\/htm\/GV.2054.htm#2054.0591:~:text=Sec.%202054.136.%20%20DESIGNATED%20INFORMATION%20SECURITY%20OFFICER.%20%20Each%20state%20agency%20shall%20designate%20an%20information%20security%20officer%20who\" target=\"_blank\" rel=\"noreferrer noopener\">Section 2054.136, Government Code<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PM-2: Information Security Program Role DIR Required By: &nbsp;07\/20\/2023&nbsp; Review Date: &nbsp;07\/31\/2024&nbsp; References\/Additional Resources 1 TAC \u00a7 202.21&nbsp;&nbsp; 1 TAC \u00a7 202.71&nbsp;&nbsp; Section 2054.136, Government Code&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":580,"parent":1520,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1645","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/brian-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"brian"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on August 5, 2024","modified":"Updated on September 5, 2024"},"absolute_dates_time":{"created":"Posted on August 5, 2024 5:22 pm","modified":"Updated on September 5, 2024 4:06 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1645"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1645\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}