Resonant Analytics Information Security Policy


Storage of Company data on computers and transfer across the network eases use and expands our functionality. Commensurate with that expansion is the need for the appropriate security measures. Security is not distinct from the functionality.

The Information Security Policy (Policy) recognizes that not all communities within the Company are the same and that data are used differently by various units within the Company. These policies apply to all units within the Company.

Each unit within the Company should apply this policy to meet their information security needs. The Policy is written to incorporate current technological advances. The technology installed at some units may limit immediate compliance with the Policy. Instances of non-compliance must be reviewed and approved by the Company.

Throughout the document the term must and should are used carefully. “Musts” are not negotiable; “shoulds” are goals for the Company. The terms data and information are used interchangeably in the document.

The terms system and network administrator are used in this document. These terms are generic and pertain to any person who performs those duties, not just those with that title or primary job duty.


By information security we mean protection of the Company’s data, applications, networks, and computer systems from unauthorized access, alteration, or destruction.

The purpose of the information security policy is:

  • To establish a Company-wide approach to information security.
  • To prescribe mechanisms that help identify and prevent the compromise of information security and the misuse of Company data, applications, networks and computer systems.
  • To define mechanisms that protect the reputation of the Company and allow the Company to satisfy its legal and ethical responsibilities with regard to its networks’ and computer systems’ connectivity to worldwide networks.
  • To prescribe an effective mechanism for responding to external complaints and queries about real or perceived non-compliance with this policy.


The Company must see to it that:

  • The information security policy is updated on a regular basis and published as appropriate.
  • Appropriate training is provided to data owners, data custodians, network and system administrators, and users.
  • Each unit appoints a person to be responsible for security implementation, incident response, periodic user access reviews, and education of information security policies including, for example, information about virus infection risks.

Employees are each responsible for establishing procedures to implement these policies within their areas of responsibility, and for monitoring compliance.


Required Policies

  • The Company will use a layered approach of overlapping controls, monitoring and authentication to ensure overall security of the Company’s data, network and system resources.
  • ecurity reviews of servers, firewalls, routers and monitoring platforms must be conducted on a regular basis. These reviews must include monitoring access logs and results of intrusion detection software, where it has been installed.

Recommended Practices

  • Vulnerability and risk assessment tests of external network connections should be conducted on a regular basis. At a minimum, testing should be performed annually, but the sensitivity of the information secured may require that these tests be done more often.
  • Education should be implemented to ensure that users understand data sensitivity issues, levels of confidentiality, and the mechanisms to protect the data. This should be tailored to the role of the individual, network administrator, system administrator, data custodian, and users.
  • Violation of the Information Security Policy may result in disciplinary actions as authorized by the Company in accordance with Company and campus disciplinary policies, procedures, and codes of conduct.


It is essential that all Company data be protected. There are however gradations that require different levels of security. All data should be reviewed on a periodic basis and classified according to its use, sensitivity, and importance. We have specified three classes below:

High Risk – Information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure. Data covered by federal and state legislation are in this class. Payroll, personnel, and financial information are also in this class because of privacy requirements.

This policy recognizes that other data may need to be treated as high risk because it would cause severe damage to the Company if disclosed or modified. The data owner should make this determination. It is the data owner’s responsibility to implement the necessary security requirements.

Confidential – Data that would not expose the Company to loss if disclosed, but that the data owner feels should be protected to prevent unauthorized disclosure. It is the data owner’s responsibility to implement the necessary security requirements.

Public – Information that may be freely disseminated

All information resources should be categorized and protected according to the requirements set for each classification. The data classification and its corresponding level of protection should be consistent when the data is replicated and as it flows through the Company.

  • Data owners must determine the data classification and must ensure that the data custodian is protecting the data in a manner appropriate to its classification.
  • No Company-owned system or network subnet can have a connection to the Internet without the means to protect the information on those systems consistent with its confidentiality classification.
  • Data custodians are responsible for creating data repositories and data transfer procedures which protect data in the manner appropriate to its classification.
  • High risk data must be encrypted during transmission over insecure channels.
  • Confidential data should be encrypted during transmission over insecure channels.
  • All appropriate data should be backed up, and the backups tested periodically, as part of a documented, regular process.
  • Backups of data must be handled with the same security precautions as the data itself. When systems are disposed of, or repurposed, data must be certified deleted or disks destroyed consistent with industry best practices for the security level of the data.


  • Data must have sufficient granularity to allow the appropriate authorized access. There is a delicate balance between protecting the data and permitting access to those who need to use the data for authorized purposes. This balance should be recognized.
  • Where possible and financially feasible, more than one person must have full rights to any Company owned server storing or transmitting high risk data. The Company must have a standard policy that applies to user access rights. This will suffice for most instances. Data owners or custodians may enact more restrictive policies for end-user access to their data.
  • Access to the network and servers and systems should be achieved by individual and unique logins, and should require authentication. Authentication includes the use of passwords, smart cards, biometrics, or other recognized forms of authentication.
  • As stated in the current company policies on appropriate and acceptable use, users must not share usernames and passwords, nor should they be written down or recorded in unencrypted electronic files or documents. When limited access to Company-related documents or files is required specifically and solely for the proper operation of Company units and where available technical alternatives are not feasible, exceptions are allowed under an articulated unit policy that is available to all affected personnel. Each such policy must be reviewed by the unit executive officer and submitted for approval. All users must secure their username or account, password, and system access from unauthorized use.
  • All users of systems that contain high risk or confidential data must have a strong password- the definition of which will be established and documented. Empowered accounts, such as administrator, root or supervisor accounts, must be changed frequently, consistent with guidelines established by the Company.
  • Passwords must not be placed in emails unless they have been encrypted.
  • Default passwords on all systems must be changed after installation. All administrator or root accounts must be given a password that conforms to the password selection criteria when a system is installed, rebuilt, or reconfigured.
  • Logins and passwords should not be coded into programs or queries unless they are encrypted or otherwise secure.
  • Users are responsible for safe handling and storage of all Company authentication devices. Authentication tokens (such as a SecureID card) should not be stored with a computer that will be used to access the Company’s network or system resources. If an authentication device is lost or stolen, the loss must be immediately reported to the appropriate individual in the issuing unit so that the device can be disabled.
  • Terminated employee access must be reviewed and adjusted as found necessary. Terminated employees should have their accounts disabled upon transfer or termination. Since there could be delays in reporting changes in user responsibilities, periodic user access reviews should be conducted by the Company.
  • Transferred employee access must be reviewed and adjusted as found necessary.
  • Monitoring must be implemented on all systems including recording logon attempts and failures, successful logons and date and time of logon and logoff.
  • Activities performed as administrator or superuser must be logged where it is feasible to do so.
  • Personnel who have administrative system access should use other less powerful accounts for performing non-administrative tasks. There should be a documented procedure for reviewing system logs.


  • The willful introduction of computer viruses or disruptive/destructive programs into the Company environment is prohibited, and violators may be subject to prosecution.
  • All desktop systems that connect to the network must be protected with an approved, licensed anti-virus software product that it is kept updated according to the vendor’s recommendations.
  • All servers and workstations that connect to the network and that are vulnerable to virus or worm attack must be protected with an approved, licensed anti-virus software product that it is kept updated according to the vendor’s recommendations.
  • Headers of all incoming data including electronic mail must be scanned for viruses by the email server where such products exist and are financially feasible to implement. Outgoing electronic mail should be scanned where such capabilities exist.
  • Where feasible, system or network administrators should inform users when a virus has been detected.
  • Virus scanning logs must be maintained whenever email is centrally scanned for viruses.


  • Operating system and application software logging processes must be enabled on all host and server systems. Where possible, alarm and alert functions, as well as logging and monitoring systems must be enabled.
  • Server, firewall, and critical system logs should be reviewed frequently. Where possible, automated review should be enabled and alerts should be transmitted to the administrator when a serious security intrusion is detected.
  • Intrusion tools should be installed where appropriate and checked on a regular basis.


  • All connections to the Internet must go through a properly secured connection point to ensure the network is protected when the data is classified high risk.
  • All connections to the Internet should go through a properly secured connection point to ensure the network is protected when the data is classified confidential.


  • All systems connected to the Internet should have a vendor supported version of the operating system installed.
  • All systems connected to the Internet must be current with security patches.
  • System integrity checks of host and server systems housing high risk Company data should be performed.


  • Company computer resources must be used in a manner that complies with Company policies and State and Federal laws and regulations. It is against Company policy to install or run software requiring a license on any Company computer without a valid license.
  • Use of the Company’s computing and networking infrastructure by Company employees unrelated to their Company positions must be limited in both time and resources and must not interfere in any way with Company functions or the employee’s duties. It is the responsibility of employees to consult their supervisors, if they have any questions in this respect.
  • Uses that interfere with the proper functioning or the ability of others to make use of the Company’s networks, computer systems, applications and data resources are not permitted.
  • Use of Company computer resources for personal profit is not permitted except as addressed under other Company policies.
  • Decryption of passwords is not permitted, except by authorized staff performing security reviews or investigations. Use of network sniffers shall be restricted to system administrators who must use such tools to solve network problems. Auditors or security officers in the performance of their duties may also use them. They must not be used to monitor or track any individual’s network activity except under special authorization as defined by campus policy that protects the privacy of information in electronic form.


In certain cases, compliance with specific policy requirements may not be immediately possible. Reasons include, but are not limited to, the following:

  • Required commercial or other software in use is not currently able to support the required features;
  • Legacy systems are in use which do not comply, but near-term future systems will, and are planned for;
  • Costs for reasonable compliance are disproportionate relative to the potential damage.

In such cases, units must develop a written explanation of the compliance issue and a plan for coming into compliance with the Company’s Information Security Policy in a reasonable amount of time.