Skip to main content

Data Center Security Policy

Policy Number: 1.11.2.2
Category: Information Technology
Effective: April 24, 2019
Revision History: Replaces Data Center Access Policy originally effective January 10, 2018
Review Date: April 23, 2022

  1. PURPOSE AND SCOPE

    1. The purpose of this Policy is to establish the physical and environmental protections to secure the University Data Centers that support the University’s Enterprise Activities at West Virginia University, West Virginia University Institute of Technology, and Potomac State College of West Virginia University (“University Data Centers”).

    2. This Policy applies to the operation of all University Data Centers as well as those individuals who are granted access to a University Data Center. This Policy does not include server rooms that feature only one source of servers, network links, or other components and have partial or no redundancy on any parts of power or cooling operations.

  2. UNIVERSITY DATA CENTERS

    1. A University Data Center is a facility, or portion of a facility, with the primary function to house data processing equipment and meets the following criteria:
      1. Features N+1 Fault Tolerance;
      2. Provides at least 72 hour power outage protection;
      3. Has no more than 1.6 hours of downtime per year; and,
      4. Can undergo routine maintenance without affecting operation; however, unplanned maintenance and emergencies may affect operations.
    2. Under Exhibit A, the University has designated all University Data Centers.
    3. The University will seek to secure University Data Centers according to generally accepted information technology standards, such as National Institute of Standards and Technology (NIST) Special Publication 800-171.
    4. Each University Data Center must be located to minimize potential damage from Environmental Hazards and Unauthorized Access.
    5. Pursuant to the Acceptable Use of Data and Technology Resources Policy, each University Data Center must only be used for its intended function, which is to house and protect University data and technology systems.
    6. To ensure proper operations of and minimize damage to University Data Centers and the equipment therein, all Data Center Assets must be tracked and monitored on a Data Center Asset Inventory.
    7. In University Data Centers equipped with cameras, the activities therein will be recorded. Pursuant to the University Record Retention Policy and Schedule, videos will be retained no less than thirty (30) days.
  3. DATA CENTER COORDINATOR RESPONSIBILITIES

    1. Each University Data Center must have a named Data Center Coordinator (“DCC”) responsible for securing University Data Centers according to the University Data Center Security Standard including:
      1. Establishing procedures to request and approve access;
      2. Maintaining a Data Center Asset Inventory;
      3. Creating and posting Data Center Safety Guidelines; and,
      4. Maintaining a list of Authorized Individuals.
    2. Under Exhibit A, the University has designated all DCCs.
  4. PHYSICAL ACCESS AUTHORIZATIONS

    1. Authorized Individuals . Each DCC will approve unescorted access to a University Data Center for individuals that require a physical presence within the data center to conduct activities, including but not limited to:
      1. System administration;
      2. Installation or de-installation of equipment;
      3. Emergency response (e.g., police, fire department);
      4. Facility system maintenance (e.g., electronic, fire suppression, air conditioning); and,
      5. Core infrastructure responsibilities.
    2. Visitors. Each DCC may grant an individual temporary access to a University Data Center. Those individuals will be considered a Visitor.
    3. Visitors must always be escorted by an Authorized Authorized Individual and be restricted, as much as is reasonably possible, to the area where the Visitor’s equipment and/or systems are located.
    4. All Authorized Individuals and Visitors granted access to a University Data Center are responsible for adhering to the posted Data Center Safety Guidelines.
  5. UNAUTHORIZED ACCESS AND UNIVERSITY DATA CENTER MISUSE

    1. Access to a University Data Center by anyone other than an Authorized Individual or an escorted Visitor is considered Unauthorized Access.

    2. Failure to comply with the Data Center Security Standard or the Data Center Safety Guidelines is considered misuse of a University Data Center and must be reported to the DCC immediately. Misuse includes, but is not limited to the following:

      1. Leaving a University Data Center door unsecured;
      2. Unauthorized photography within a University Data Center;
      3. Failure to provide two forms of identification and sign in when accessing a University Data Center;
      4. Group entry into a University Data Center using a single authorized card; or,
      5. Entering a University Data Center unescorted by an Authorized Individual.
  6. DEFINITIONS

    1. “Authorized Individual” means a person with unescorted access to a University Data Center such as a DCC or a vendor conducting maintenance.
    2. “Data Center Assets” means the components located within a specific University Data Center including, but not limited to, virtual machines, servers, blade systems, network devices, UPS, rack power distribution units (“PDUs”), and uninterruptible power supply ("UPS") system(s).
    3. “Data Center Asset Inventory” means an inventory that provides detailed information of the Data Center Assets located within a University Data Center and classifies the assets in accordance with business criticality. It is the decision of each DCC as to how inventory for each University Data Center will be maintained, provided it offers the ability to add, assign, locate, and remove all assets within each DCC’s responsibility.
    4. “Data Center Coordinator (DCC)” means the University employee responsible to protect and oversee a University Data Center according to the Data Center Security Standard.
    5. “Enterprise Activities” means the activities that support the academic, administrative, outreach, and research missions of the University that are supported by Information Technology Services and/or Health Sciences Information Technology Services.
    6. “Environmental Hazards” means a substance, state, or event that has the potential to threaten a data center including, but not limited to, flooding, fire, tornadoes, earthquakes, hurricanes, acts of terrorism, vandalism, electromagnetic pulse, electrical interference, and other forms of incoming electromagnetic radiation.
    7. “N+1 Fault Tolerance” means parallel redundancy is in place to ensure that an uninterruptible power supply (“UPS”) system designed to provide consistent power for infrastructure plus another UPS system to act as a backup power generator in case of emergencies.
    8. “Unauthorized Access” means access to a University Data Center that has not been approved by the appropriate DCC.
    9. “Uninterruptible Power Supply (UPS)” means a system that provides a continuous supply of power to a load, utilizing stored energy when the normal source of energy is not available or is of unacceptable quality. A UPS will provide power until the stored energy of the system has been depleted or an alternative or the normal source of power of acceptable quality becomes available.
    10. “Visitor” means a person granted escorted access to a University Data Center (e.g., tour participant, student).
  7. ENFORCEMENT & INTERPRETATION

    1. Any employee who violates this Policy will be subject to appropriate disciplinary action.
    2. Any Student who violates this Policy will be subject to appropriate disciplinary action in accordance with the Student Code of Conduct.
    3. Any individual affiliated with the University who has access to a University Data Center and violates this Policy will be subject to appropriate corrective action, including, but not limited to, termination of the individual’s relationship with the University.
    4. The University’s Chief Information Officer, supported by the Chief Information Security Officer, will coordinate with appropriate University entities on the implementation and enforcement of this Policy.
    5. Responsibility for interpretation of this Policy rests with the Chief Information Officer.
  8. AUTHORITY & REFERENCES

    1. BOG Governance Rule 1.11 - Information Technology Resources and Governance
    2. All other University policies are also applicable to the electronic environment. Relevant institutional policies include, but are not limited to:
      1. Security Camera Installation and Use Policy
      2. Acceptable Use of Data and Technology Resources Policy
      3. Faculty Handbook
      4. Code of Student Rights and Responsibilities (Code of Conduct)
      5. WVU Talent and Culture Policies
      6. WV Higher Education Policy Commission Rules and Policies

Related Documents

Service Desk Hours and Contact

Service Desk Hours

Sunday: 10 a.m. - 10 p.m.   
Monday through Thursday: 7:30 a.m. - 10 p.m.
Friday: 10 a.m. - 8 p.m.
Saturday: 10 a.m. - 5 p.m.
Closed on most WVU Holidays

Contact Us

Information Technology Services
One Waterfront Place
Morgantown, WV 26506

(304) 293-4444 | 1 (877) 327-9260
ITSHelp@mail.wvu.edu

Get Help

Maintenance Schedule

To function effectively and securely, applications and the systems that support them must undergo regularly planned maintenance and updates.      

See Schedule