| Policy Category | Policy Owner | Version Effective Date | Review Cycle | Last Reviewed | Policy Contact |
| X. Information Governance, Security & Technology | SVP, General Counsel, and Chief People Officer | April 3, 2026 | Every 3 years | April 3, 2026 | infogov@umgc.edu |
Purpose
The purpose of this Policy is to establish audit and accountability requirements to ensure that University Information Systems generate, protect, retain, and review audit records necessary to support the detection, analysis, investigation, and reporting of unauthorized, suspicious, or anomalous activity. This Policy ensures that actions can be uniquely traced to accounts both user and service, that Security Logs are collected and centrally managed when feasible, and that audit information is safeguarded against unauthorized access, modification, or deletion in order to maintain the integrity, availability, and reliability of University security monitoring and incident response capabilities.
Scope and Applicability
This Policy applies to all University Information Systems, applications, infrastructure, and Information Technology Resources. Information System Stewards and Technical System Leads are responsible for adhering to this Policy.
Definitions
Defined terms are capitalized throughout this Policy and can be found in the听Information Governance Glossary.
If technically and administratively feasible, audit information should be collected (e.g., logs) into one or more central repositories.
For example 鈥 Information System Stewards should aggregate and store Audit Logs in a centralized location or locations within the organization. Storing Audit Logs in a centralized location supports orchestration, automation, correlation, and analysis activities by enabling a full picture of the Audit Logs and can support automated analysis capabilities including correlation of events across the enterprise. Information System Stewards should ensure that the central repository has the appropriate infrastructure, including protection mechanisms, and the capacity level to meet the logging requirements of the organization.
Exceptions
Exceptions to this Policy should be submitted to Information Security for review and approval. If an exception is requested a compensating control or safeguard should be documented and approved.