X - 3.00 - Policy on Data Privacy
I. Purpose
Bowie State University has adopted this policy to govern the handling of our community’s private personal information. The institution takes the privacy of any Personally Identifiable Information (PII) very seriously and will take any steps necessary to ensure that all information entrusted to the institution is handled with the utmost care and in accordance with any applicable laws and regulations. The purpose of this policy is to define personally identifiable information, establish the University’s general principles for protecting PII, and assign accountability for the protection of PII.
II. Applicability
This Policy applies to all University employees, agents, representatives, contractors, third-party providers of services, students, guests of the University, and any other person with access to Personally Identifiable Information owned or controlled by the University.
This Policy applies to all Personally Identifiable Information collected, maintained, transmitted, stored, retained, or otherwise used by the University regardless of how the information was collected, the media on which that information is stored, or the relationship between the University and the Data Subject.
This Policy applies regardless of the origin of the PII, including but not limited to existing University data sets, newly collected data sets, and data sets received from or created by third parties.
This Policy applies to all locations and operations of the University, including but not limited to applications, projects, systems, or services that seek to access, collect, or otherwise use Personally Identifiable Information.
However, this policy does not apply to Personally Identifiable Information that:
- is publicly available information that is lawfully made available to the general public from federal, State, or local government records;
- an individual has consented to have publicly disseminated or listed;
- except for a medical record that a person is prohibited from redisclosing under § 4-302(d) of the Health--General Article, is disclosed in accordance with the federal Health Insurance Portability and Accountability Act;
- is disclosed in accordance with the federal Family Educational Rights and Privacy Act;
- is clinical information; or
- is information related to sponsored research.
III. Statutory Conflict
If at any point this policy conflicts with local, state, federal, or international laws or regulations, the applicable laws and regulations shall govern.
IV. Definitions
Data Governance – the exercise of authority, planning, monitoring, and enforcement over the management of data assets, defining who can take what actions, with what information, under what circumstances, and using what methods.
Data Subject – the individual to whom a particular PII record relates.
Legitimate Basis or Legitimate Business Use - means that the University has a contractual need, public interest purpose, business purpose, or other legal obligation to retain and/or process information or data in the University’s possession, or a Data Subject has consented to the retaining and/or processing of information or data in the University’s possession.
Personally Identifiable Information (PII) – any information that is taken alone or in combination with other information, enables the identification of an individual, including:
-
- Social Security number;
- A driver’s license number, state identification card number, or other individual identification number;
- A passport number;
- Biometric information, including an individual’s physiological, biological, or behavioral characteristics, including an individual's DNA, that can be used, singly or in combination with each other or with other identifying data, to establish individual identity;
- Geolocation data;
- Internet or other electronic network activity information, including browsing history, search history, and information regarding an individual’s interaction with an internet website, application, or advertisement; and
- A financial or other account number, a credit card number, or a debit card number that in combination with any required security code, access code, or password, would permit access to an individual’s account.
PII does not include data rendered anonymous through the use of techniques, including obfuscation, delegation and redaction, and encryption so that the individual is no longer identifiable.
Processing – any operation or set of operations that are performed on personally identifiable information or on a set of personally identifiable information, whether or not by automated means, including collection, recording, organization, structuring, storage, adaption or alteration, retrieval, consultation, use, disclosure by transmission, dissemination, or otherwise making available, alignment or combination, restriction, erasure or destruction.
Records – information that is inscribed on a tangible medium or that is stored in an electronic or other medium and is retrievable in perceivable form.
System – an electronic or other physical medium maintained or administered by the University and used on a procedural basis to store information in the ordinary course of the business of the University.
System of Record – a System that has been designated by the University as a System of Record. Determination that a System is a System of Record is based on the following criteria:
- the risk posed to individuals by the Personally Identifiable Information processed and stored on the System;
- the relationship of the System to the overall function of the University; and
- the technical and financial feasibility of implementing privacy controls and services within the System.
V. Privacy Principles
Bowie State University has adopted the following principles to help guide decisions regarding the collection, storage, and use of Personally Identifiable Information.
- Accuracy – The University will keep Personally Identifiable Information accurate and, where necessary, up to date.
- Appropriate Access – All units of the University will apply the principle of least privilege when facilitating access to University PII: that is, users and applications should have the minimum access needed to perform their functions. Data Stewards will be consulted with and maintain approval for access to PII.
- Expectation of Privacy – To promote academic freedom and an open, collegial atmosphere, the University recognizes and acknowledges that its employees, affiliates, students, and guests have a reasonable expectation of privacy. This expectation of privacy is subject to applicable state and federal laws in addition to University policies and regulations, including the Privacy Principles set forth in this Policy, the University’s Policy on Acceptable Use of Information Technology Resources, and all associated standards and guidelines.
- Minimization – The University will only collect the minimal amount of information that is necessary for a specific purpose and dispose of any PII when no longer needed for a previously authorized purpose.
- Responsibility – Whoever requests or processes Personally Identifiable Information has the responsibility to ensure that the collection, storage, and use of such data follows the appropriate University Policies and Guidelines as well as Federal and State laws and regulations.
- Shared Responsibility – Everyone has a role in ensuring data quality, data protection, and the responsible handling of the University’s information resources.
- Storage – Personally Identifiable Information will be deleted in accordance with the University’s retention/deletion policy when no longer needed for its originally collected purpose and not authorized by the relevant Data Subjects to be used for a new purpose.
- Relevancy – The University will only collect information that is relevant for a specific purpose.
- Transparency – The University is committed to being transparent about the information we collect and how it is used.
VI. Disclosures
Some Personally Identifiable Information may be subject to disclosure under the Maryland Public Information Act or other federal and state laws or regulations.
The University reserves the right to access and use Personally Identifiable Information in its sole discretion to investigate actual or suspected instances of misconduct or risk to the University, students, faculty, staff, and third parties, subject to applicable law and University policy.
The University reserves the right to disclose any relevant information, including PII, when required by law enforcement or to satisfy appropriate subpoenas, warrants, or other legal requirements.
VII. Organizational Structures
Chief Privacy Officer – There is a Chief Privacy Officer (CPO) who is responsible for the daily operations of the University’s Privacy Office. It is the responsibility of the Chief Privacy Officer to provide technical, legal, and regulatory guidance to the University’s leadership and business units concerning privacy matters. Additionally, the Chief Privacy Officer shall participate in and provide recommendations to the Institutional Privacy Council regarding this Policy, any of its supplemental documentation, and other privacy-related topics.
Privacy Office – The Privacy Office is responsible for the day-to-day implementation and functioning of this Policy and the University’s overall privacy program by handling privacy requests and providing the community with effective tools, appropriate resources, and training.
Institutional Privacy Council – The Institutional Privacy Council is responsible for the privacy governance program of the institution and will work with appropriate stakeholders to further the privacy program. For duties and responsibilities of the Council see “Institutional Privacy Council Responsibilities” below. The Chief Privacy Officer is the chair of the Institutional Privacy Council.
The Institutional Privacy Council is made up of the following or their designee:
- Chief Privacy Officer
- Chief Information Officer
- General Counsel
- Chief Human Resources Officer (Employee Records)
- Vice President for Enrollment Management and Student Affairs (Student Records)
- Vice President for Philanthropic Engagement (Alumni and Donor Records)
- Assistant Vice President for Research (Oversight of Required Reporting)
- Vice President for Administration and Finance
VIII. Institutional Privacy Council Responsibilities
The Institutional Privacy Council has oversight of the privacy governance program of the University. The Privacy Council will ensure that the privacy governance program:
- Identifies and supervises the management of every System of Record in the institution;
- Identifies and documents the purposes for processing PII in any System of Record;
- Ensures that the collection of PII is limited to only to the minimum amount of information necessary for the purpose of collection;
- Ensures that any PII collected is accurate, relevant, and complete;
- Oversees the process for Data Subjects to request all data about the Data Subject held in a System of Record;
- Provides a process for Data Subjects to request correction of any inaccurate information or make a note of any disputed information;
- Provides a process to opt-out of the sharing of information with third parties if the University does not have a legitimate basis to process the information;
- Provides a process for Data Subjects to request deletion of information if there is no legitimate basis for the University to continue having the information;
- Governs the appropriate disclosure of PII to third parties; and
- Oversees the institution’s privacy standards and guidelines and the institutional privacy statement.
IX. Standards and Guidelines
This Policy is supplemented by institutional Privacy Standards and Guidelines. These privacy standards and guidelines address the implementation of the institution’s privacy program, including but not limited to the Privacy Principles identified in Section IV, access to specified data types, vendor management, incident response, and the exceptions process.
The Chief Privacy Officer or their designee may issue, amend, or rescind such Privacy Standards and Guidelines as the Chief Privacy Officer deems necessary to comply with legal obligations and University Policy.
X. Exceptions
Where a legitimate need has been demonstrated, such as a novel use of an existing data set for health and safety purposes, the Chief Privacy Officer or designee, in consultation with appropriate stakeholders, may grant exceptions to this Policy and its Guidelines and Procedures.
When considering requests for exceptions, the Chief Privacy Officer or designee, in consultation with the Institutional Privacy Council, will conduct a privacy impact assessment that measures the documented purpose of the exception against the privacy risks to the individuals affected.
Any exceptions must be the minimum necessary to achieve the goals of the proposed use while still adhering to the principles outlined in this Policy.
Subject to the University's legal obligations or circumstances that necessitate immediate access, the University will attempt to provide advance notification to an individual prior to the use of the individual's PII pursuant to an exception request. In certain instances, individuals may be unavailable to receive such advance notification, or such notification may not be reasonably practicable. In such cases, use of the data may occur without notification, which is consistent with applicable law.
XI. Policy Violations
Violations of this policy may result in disciplinary or punitive action in accordance with applicable University Policies and Procedures. Furthermore, certain violations may be referred to the appropriate State or Federal law enforcement agencies for investigation. Anyone who has knowledge of or suspects a violation of this policy may make a report to the Department of Information Technology at helpdesk@bowiestate.edu.
XII. Responsible Official
Vice President for Information Technology and Chief Information Officer
XIII. Related Policies
The Family Educational Rights and Privacy Act (FERPA)
USM X-1.0 – Policy on USM Institutional Information Technology Policies, Including Functional Compatibility with the State Information Technology Plan
BSU III-6.30 Policy on Confidentiality and Disclosure of Student Records
BSU V-1.20 Policy on Student Social Media
BSU X-1.00 Policy on Information Technology Security
BSU X-15.13 Policy on Acceptable Use
BSU X-15.09 Interim Policy on Use of E-Mail by State Employees
BSU X-15.15 Policy on Social Media
Effective Date: 10/17/2024