Glossary of Terms
This document contains definitions for terms that are used throughout the Clemson University (hereinafter, the “University”) Information Security policies and procedures.
Acceptable Use | An individual’s permitted activities while utilizing IT Resources of the University in accordance with the policies and procedures, and applicable state and federal laws.
|
Affiliate | See Clemson University Human Resources Glossary of Terms.
|
Chief Information Officer (“CIO”) | Senior-level employee with overall responsibility for the University’s IT Resources.
|
Chief Information Security Officer (“CISO”) | Senior-level employee with delegated responsibility for securing the University’s IT Resources.
|
Clemson Computing and Information Technology (“CCIT”) | Department of the University that manages and administers the IT Resources of the Univesity.
|
Computer Network | The means through which Data and Information is transferred between IT Resources and Information Systems. This includes Employee wired/wireless access, guest wired/wireless access, virtual private network (“VPN”), and local network connections.
|
Computing Device | General term that includes computer desktops, laptops, tablets, smartphones, and other specialized IT equipment.
|
Cyber Security | The ability to protect electronic IT Resources that are accessible via internal University networks or the internet.
|
Cyberspace | Virtual computer world (e.g., the Internet) used to facilitate online global communications.
|
Compensating Control | Mechanism put in place to satisfy a security measure that may be impractical to implement for a system or process.
|
Department | Operating unit of the University, which include colleges, schools, research, business, or service centers.
|
Data | Individual facts, statistics, or source information stored for reference or analysis.
|
Data Trustee | Executive leaders responsible for Data policies that promote the quality, access, inventory, definition, security, and Acceptable Use of Data across the University.
|
Employee | See Clemson University Human Resources Glossary of Terms.
|
Endpoint | Any device that connects to the Clemson network, and includes any desktop or laptop purchased by Clemson and issued to a user.
|
Information | Data that is processed, organized, and structured. It provides context for the Data and enables decision making.
|
Information Security | The protection of IT Resources from unauthorized access, use, disclosure, disruption, modification, or destruction, with the goal of providing confidentiality, integrity, and availability.
|
Information Security Incident | An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an Information System or the Information the Information System processes, stores, or transmits or that constitutes a violation or imminent threat of violation of Information Security policies, Information Security procedures, or Acceptable Use policies. |
Information System | An integrated set of components, such as hardware and software, for collecting, storing, and processing Data and thereby providing Information.
|
Information System Owner | Any person that is responsible for Information Security and overall operations of a specific University Information System.
|
Information Technology (“IT”) | The use of Computing Devices and Computer Networks to create, process, store, retrieve and exchange electronic Data and Information.
|
IT Consultant | Person(s) responsible for the support of Information Systems and services. Responsibilities include, but are not limited to, the implementation, configuration, maintenance, and decommissioning of Information Systems and services.
|
IT Credentials | The combination of a User Account and password that controls access to Data, Information, Computing Devices, Computer Networks, or Information Systems. Two-factor controls are also a part of IT Credentials.
|
IT Resources | Includes Computer Networks, Computing Devices, and Information Systems used to store, process, or transmit Information and/ or Data, and additionally includes all such Information and Data.
|
Office of Information Security (“OIS”) | The University’s Information Security office that is responsible for coordinating the development and dissemination of Information Security policies, standards, and guidelines.
|
Principle of Least Privilege | Concept that User Accounts are granted as few privileges as possible to IT Resources, and that access is based on roles and responsibilities.
|
User | Individuals with electronic access to the University’s IT Resources. This includes employees, students, visitors, contractors, and others granted access to the IT Resources.
|
User Account | An identity created for a User in a Computing Device for accessing IT Resources. Accounts contain a unique username or login ID and require a password or other IT Credentials to successfully authenticate.
|
ADDITIONAL RESOURCE
HR Glossary of Terms: https://hr.app.clemson.edu/poly-proc/Glossary_of_Terms.pdf