Stevens Gramm Leach Bliley (GLB) Act Information Security Plan

This Information Security Plan (“Plan”) describes Stevens Institute of Technology’s safeguards and protocols to secure and protect information and data in compliance with the Financial Services Modernization Act of 1999, also known as the Gramm Leach Bliley Act, 15 U.S.C. Section 6801.

These safeguards are provided to:

  • Protect the security and confidentiality of what is termed “Protected Information”

  • Protect against anticipated threats or hazards to the security or integrity of such information;

  • Protect against unauthorized access to or use of Protected Information that could result in substantial harm to any customer.

This Information Security Plan also provides for mechanisms to:

  • Identify and assess the risks that may threaten Protected Information maintained by the Institute

  • Designate employees and corresponding responsibilities relative to this program

  • Design and implement a safeguards program

  • Manage the selection of appropriate service providers

  • Adjust this plan as required to reflect changes in technology, the sensitivity of Protected Information, and internal or external threats to information security

  • Reference related policies, standards, and guidelines.

Identification and Assessment of Risks to Customer Information

Stevens Institute of Technology recognizes that it has both internal and external risks. These risks include, but are not limited to:

  • Unauthorized access of Protected Information by someone other than the owner of the covered data and information

  • Compromised system security as a result of system access by an unauthorized person

  • Interception of data during transmission

  • Loss of data integrity

  • Physical loss of data as a result of a manmade or natural disaster

  • Errors introduced into the system in any fashion

  • Corruption of data or systems

  • Unauthorized access of covered data and information by employees

  • Unauthorized requests for covered data and information

  • Unauthorized access through hardcopy files or reports

  • Unauthorized transfer of covered data and information through third parties.

Stevens recognizes that this may not be a complete list of the risks associated with the protection of Protected Information. Since technology development, use, and proliferation is not static, new risks are constantly emerging. Accordingly, Stevens uses a number of efforts including Enterprise Risk Management in order to identify and plan responses for those risks to the extent possible.

Information Security Plan Coordinators

The Office of Information Technology, in consultation with and through cooperation from, other offices on campus, is responsible for the maintenance of information security and privacy. Each department responsible for safeguarding Protected Information will provide an annual update report indicating the status of its safeguarding procedures. The Coordinators in these areas are responsible for assessing the risks associated with unauthorized transfers of Protected Information and implementing procedures to minimize those risks that are appropriate based upon the University’s size, complexity and the nature and scope of its activities.

Design and Implementation of Safeguards Program

Employment Management and Training

In accordance with University policies, standards, and guidelines, reference checking and background reviews will be conducted when deemed appropriate. During employee orientation, each new employee in departments that handle Protected Information will receive proper training on the importance of confidentiality of Protected Information. Each new employee will also be trained in the proper use of computer information and passwords. Further, each department responsible for maintaining Protected Information will provide ongoing updates to its staff. These training efforts should help minimize risk and safeguard covered data and information security.

Physical Security

Stevens Institute has addressed the physical security of Protected Information by limiting access to only those employees who have a business reason to know such information and requiring signed acknowledgement of the requirement to keep Protected Information private. Existing policies establish a procedure for the prompt reporting of the loss or theft of Protected Information. Offices and storage facilities that maintain Protected Information limit customer access and are appropriately secured. Paper documents that contain Protected Information are shredded at time of disposal.

Information Systems

Information systems include network and software design, as well as information processing, storage, transmission, retrieval, and disposal. Stevens has standards, and guidelines governing the use of electronic resources and firewall and wireless policies. Stevens Institute of Technology will take reasonable and appropriate steps consistent with current technological developments to make sure that all Protected Information is secure and to safeguard the integrity of records in storage and transmission. Stevens will develop a plan to protect all electronic Protected Information by encrypting it for transit.

Management of System Failures

The Institute will maintain effective systems to prevent, detect, and respond to attacks, intrusions and other system failures. Such systems may include maintaining and implementing current anti-virus software; checking with software vendors and others to regularly obtain and install patches to correct software vulnerabilities; maintaining appropriate filtering or firewall technologies; alerting those with access to covered data of threats to security; imaging documents and shredding paper copies; backing up data regularly and storing back-up information off site, as well as other reasonable measures to protect the integrity and safety of information systems.

Selection of Appropriate Service Providers

Due to the specialized expertise needed to design, implement, and service new technologies, vendors may be needed to provide resources that Stevens Institute determines not to provide on its own. In the process of choosing a service provider that will maintain or regularly access Protected Information, the evaluation process shall include the ability of the service provider to safeguard Protected Information. Contracts with service providers may include the following provisions:

  • A stipulation that the Protected Information will be held in strict confidence and accessed only for the explicit business purpose of the contract;

  • An assurance from the contract partner that the partner will protect the Protected Information it receives.

Continuing Evaluation and Adjustment

This Information Security Plan will be subject to periodic review and adjustment, especially when due to the constantly changing technology and evolving risks. The Coordinators, in consultation with the Office of General Counsel, will review the standards set forth in this policy and recommend updates and revisions as necessary. It may be necessary to adjust the plan to reflect changes in technology, the sensitivity of student/customer data and internal or external threats to information security.

Policies, Standards and Guidelines


  • Background Verification

  • Employee Conduct and Work Rules

  • Privacy Rights of Students

  • Release of Student Information

  • Lost or Stolen Student Records

  • Computer, Internet, and Electronic Communications

Guidelines and Resources

  • Student Educational Records – FERPA

  • Desktop and Network Security

  • Personal Desktop Security for Home and Office

  • Anti-Virus Updates and Utilities

  • Stevens’ Site-Licensed Software: Recommended Software

Need IT Support?

Get support through our self help resources, contacting IT support or visiting TRAC.