Policy Group
9000 School Facilities
Jerome Joint School District No. 261
SCHOOL FACILITIES 9550
Cybersecurity & Data Breach Response Policy
NOTE: This policy discusses a breach response plan the District should create to address possible data breaches. In the “Other References — Sample Breach Response Plans” portion below, this policy includes references to sample plans that may be useful as a starting point in creating such a plan. We recommend consulting an attorney and District technology staff to ensure these plans are in compliance with all requirements and meet the District’s
needs.
This policy aims to prevent data breaches and to ensure any such breaches are addressed quickly and
appropriately. In pursuit of this, the Board directs the Superintendent or designee, Technology Director or
designee, to work toward implementing the Center for Internet Security (CIS) Critical Security Controls.
Prevention Strategies
For the purposes of this policy, a data breach refers to any instance in which there is an unauthorized release or
access of personally identifiable information, as defined in Policy 3575 or of other sensitive data. This can include,
but is not limited to, student educational records, personnel records, and financial records. It can include situations
such as malicious actors gaining access to District devices or systems; the loss of District devices; and devices or
networks left unsecured by accident, negligence, or a security system failure.
Sensitive data shall mean data whose release could cause social, physical, or financial harm to the individual(s) it
pertains to or to the District.
The Board emphasizes the following cybersecurity principles, which the Superintendent or designee, Technology
Director or designee, shall draft procedures to implement:
1. Multifactor authentication for remote access and admin/privileged controls: To the extent feasible, phishing-
resistant multifactor authentication will be required to access sensitive information and security-sensitive systems.
2. Endpoint detection and response: The Superintendent or designee, or Technology Director or designee, shall
ensure all District devices are protected by endpoint protection including, but not limited to, antivirus software
and any other appropriate measures to detect attempted breaches of network security. The Superintendent or
designee, or Technology Director or designee, shall ensure District devices are safe when used at school and, if
applicable, when used at other locations. They shall ensure steps are taken to block access to known malicious
content online, to protect users from email-based attacks, and to ensure security updates are installed promptly.
3. Secured, encrypted, and tested backups: The Superintendent or designee, or Technology Director or designee,
shall ensure backups of important data are maintained securely to protect against data loss or destruction. They
shall strive, when feasible, to ensure three backup copies of important data are kept, two of which are stored on
different mediums, and one of which is stored at a separate physical site from the others. At least one of these
copies should be stored on a device not connected to the Internet.
4. Privileged access management: The Superintendent or designee, or Technology Director or designee, will
regularly check that individuals who no longer need access to sensitive data and systems do not have access to
them. This shall include ensuring access is immediately terminated when an individual’s employment with the
District is terminated or otherwise separated and when a student graduates or otherwise exits the District. To the
extent feasible the Superintendent or designee, or Technology Director or designee, shall ensure that duties are
separated to prevent inappropriate access to or use of sensitive data. This also includes a requirement to ensure
passwords are secure and are not shared. To limit risk, sensitive data will be safely archived or deleted when
appropriate.
The Superintendent or designee, or Technology Director or designee, shall maintain an inventory of the District’s
physical and electronic assets related to cybersecurity that designated staff members should secure in the event of
a possible disaster or data breach. These assets include, but are not limited to electronic files, logins, electronic
devices, and equipment used to provide access to the Internet and any District networks. The list shall indicate
where these assets are stored and how they are protected.
The Superintendent or designee, or Technology Director or designee, shall also conduct privacy risk assessments
for the District and of parties with whom it shares sensitive data. For this policy, privacy risk assessment shall mean
a process to help analyze and assess privacy risks arising from the processing of their data.
Training and Awareness
The Superintendent or designee, or Technology Director or designee, shall provide and require training on
cybersecurity, preventing data breaches, and securing confidential records for staff. This may include providing
information on how and when to report a possible data breach.
Failure to participate in such training could have negative consequences to the individual or entity which may
include, but are not limited to, personnel action, refusal to allow the person or entity to use the District’s computer
systems or electronic devices.
Breach Response
The Superintendent or designee, or Technology Director or designee, shall check for signs of a data breach through such methods as automated tools, verifying whether current security measures are effective, searching online for signs of leaked data, and conducting tests of current security.
The Superintendent or designee, or Technology Director or designee, shall create a Data Breach Response Plan for
inclusion in the District’s Crisis Management Plan. They may involve experts and stakeholders in the process of
creating this plan. The Superintendent or designee, or Technology Director or designee, may also conduct regular
data breach drills or tests of portions of the Data Breach Response Plan. Those responsible for implementing the
Data Breach Response Plan may be provided with training on or notification of the Plan regularly. The
Superintendent or designee, or Technology Director or designee, and any experts and stakeholders they choose to
involve shall review the Plan annually to ensure it is current and that any appropriate improvements are made to
it. Such review shall also take place following any suspected data breach.
The Superintendent or designee, or Technology Director or designee, shall direct staff to report any possible data
breach to the Superintendent or designee, or the Technology Director or designee. Apart from such reporting, staff
shall keep information about the breach confidential unless and until they have been assigned communication
responsibilities related to the breach.
If the District identifies a lapse in security exposing sensitive information but it is unclear whether anyone has
obtained or accessed such data, the District shall immediately remedy the issue.
The District’s Data Breach Response Plan shall include the following elements:
1. A process for determining whether a suspected breach is an actual breach and, if so, for learning about the nature of it, such as:
a. Whether the breach is still active;
b. The scope of the breach; and
c. Whether the breach was accidental or malicious and whether it was internal or external.
2. The positions responsible for participating in the response to a possible data breach, including:
a. The Superintendent or their designated administration representative;
b. Information technology staff;
c. The District legal counsel;
d. The business manager or designee.
The plan shall also include the duties of each position, as determined by the Superintendent or designee, or
Technology Director or designee.
3. A process for deciding the appropriate course of action. This shall include:
a. Choosing an individual or organization to investigate the breach;
b. A listing of District resources available to address the breach and the authority who can approve their use;
c. Fixing an active breach;
d. Consulting with legal counsel to ensure legal requirements are met, including any federal, state, or district-level requirements to notify outside authorities or victims of a breach;
e. A plan for providing information about the breach if required or when communication is
appropriate for the sake of transparency, to assist agencies working to prevent future breaches;
f. Providing support to individuals whose sensitive data was subject to the breach;
g. Whether to report the incident to law enforcement and, if so, how to coordinate with them;
h. Determining which outside organizations or individuals should be consulted or involved in the response, such as the Family Policy Compliance Office or other outside experts;
i. Taking measures to preserve evidence of the breach and document the District’s response;
j. Determining the cause of the breach and how to prevent similar breaches in the future, such as through technological fixes, training, or other measures; and
k. A plan for maintaining continuity of District operations through the breach. This plan shall
include details on the keeping and use of data backups.
Third Parties
The Superintendent or designee, or Technology Director or designee, shall take measures to limit risk when using
third-party tools or services and when it is necessary to share sensitive data with third parties.
They shall also regularly review such third parties' policies on data breach notifications and backing up data or
ensure these topics are addressed adequately in the District’s contract with such providers.
Legal Compliance and Insurance
The Superintendent or designee, or Technology Director or designee, shall report any cybersecurity incident to the
Office of the Attorney General within 24 hours as required by IC 28-51-105.
The Superintendent or designee, or Technology Director or designee, shall record any breach of education records
in the log of releases of information described in Procedure 3570P. Any cybersecurity incident shall also be
reported to the federal Cybersecurity and Infrastructure Security Agency if required by the Cyber Incident
Reporting for Critical Infrastructure Act of 2022 or, in cases where reporting is optional if the Superintendent or
designee, or Technology Director or designee, chooses to do so.
In the event of any cybersecurity event, the Superintendent or designee, or Technology Director or designee, shall
immediately contact their cybersecurity insurance provider and, if applicable, the District’s managed security
provider.
Legal References Description
34 CFR 99.32(a)(1) What Recordkeeping Requirements Exist Concerning Requests and Disclosures?
CIRCIA Cyber Incident Reporting for Critical Infrastructure Act of 2022
IC § 28-51-104 Definitions
IC § 28-51-105 Disclosure of Breach of Security of Computerized Personal Information by an Agency,
Individual or a Commercial Entity
Sample Cybersecurity Description
Breach Response Plan
Center for Internet Security Information Security
Center for Internet Security Acceptable Use of Information Technology Resources Policy
Center for Internet Security NIST Cybersecurity Framework: Policy Template Guide
Center for Internet Security CIS Critical Security Controls Version 8
Center for Internet Security Acceptable Use Policy Template for the CIS Controls
SANS Institute Security Policy Templates
Cross References
Code Description
3570 Student Records
3575 Student Data Privacy and Security
Policy History:
Adopted on: 05/28/2024
Revised on: