Apply Now
hamburger menu

6-17-2 TTC Information Security Data Breach Response Plan

Table of Contents

  1. Introduction
  2. Area Commission
  3. Information Technology
  4. Plans and Analysis
  5. Marketing
  6. Financial Affairs

    6-1-1 Annual Report

    6-1-2 Travel Authorization & Reimbursement

    6-1-3 Petty Cash

    6-1-4 Student Travel, Authorization & Reimbursement

    6-2-1 Professional Development Program

    6-2-2 Memberships in Professional Organizations

    6-2-3 Tuition Assistance

    6-3-1 Funds, Receipt and Deposit

    6-5-1 Budget Transfers

    6-5-2 Federal Funds, Expenditure & Control Of

    6-6-1 Budget Administrator Responsibility

    6-6-2 Invoice Payment Process

    6-7-1 Funds, Investment of Surplus

    6-8-0 Refunds Policy

    6-8-1 Refunds

    6-9-1 Authorized Signatures/Bank Withdrawals

    6-12-1 Capital Plant Fund

    6-13-0 Educational Fee Waiver Policy

    6-13-1 Educational Fee Waiver

    6-14-0 Student Fees Policy

    6-14-1 Checks - Information Required, Returned Checks and Credit Card Chargebacks

    6-15-0 Expenditure of Auxiliary Income

    6-15-1 Expenditure of Auxiliary Income Procedure

    6-15-2 Employee Recognition, Official and Unofficial

    6-16-1 Internal Auditing Department

    6-17-1 Information Security Plan

    6-17-2 Information Security Data Breach Response Plan

    6-18-1 Red Flags Rule Identity Theft Prevention Plan

  7. Facilities Management
  8. Human Resources and Employee Relations
  9. Development
  10. Procurement and Inventory Control
  11. Auxiliary Enterprises and Printing Services
  12. Public Safety
  13. Academic Affairs
  14. Learning Resources
  15. Continuing Education and Economic Development
  16. Admissions and Registrar
  17. Student Services

NUMBER: 6-17-2 APPROVED DATE: 10-21-2019

BASED ON POLICY NUMBER AND TITLE: TTC Policy 2-13-0 EP 5: Asset Protection; SBTCE Policy 4-4-105 Information Security

What is an Information Security Data Breach?
A type of incident which includes the access, use, theft, loss of control, disclosure and/or distribution of sensitive data (e.g. SSN, DOB, student grades, tax records, credit card information, medical records) in violation of a law or regulation.

An information security data breach incident may involve any or all of the following:

  • A violation of Federal data privacy laws (FERPA, HIPAA, GLBA), South Carolina Technical College System information security policies and procedures, and TTC information security policies and procedures.
  • Unauthorized data access by an employee or external entity.
  • Unintended disclosure of, loss of, or altered sensitive data.
  • Presence of a malicious application, such as a virus or malware, that impacts sensitive data.
  • Credentials or other access control mechanisms that are lost, stolen, or disclosed.
  • Lost or stolen computing devices that contain sensitive data.
  • Lost or stolen mobile storage devices that contain sensitive data.

Information Security Data Breach Response Team

  • TTC Information Security Liaison
  • Chief of Staff, Student Services
  • Director, Finance
  • Associate VP, Human Resources
  • Registrar, Student Services
  • Director, Infrastructure Services
  • Director, IT Customer Service
  • Director, Enterprise Services
  • Operations Manager, Enterprise Services
  • Director, Public Safety
  • Public Information Director, Marketing
  • Business Operations Manager, Continuing Education
  • Assistant VP, Academic Affairs
  • Internal Auditor, Finance and Administration
  • TTC Legal Liaison

Information Security Data Breach Notification

  1. TTC employees or third party contractors must complete the data breach alert form to report a data breach. If the form is not available, please email the Data Breach Response Team at databreach@tridenttech.edu.  If email is not available, please call TTC’s Information Security Liaison at 843-574-6311 or the IT Helpdesk at 843-574-6801.
  2. Describe the type of protected/sensitive data breached:
    • Social Security Number
    • Date of birth
    • Tax records
    • Student grades
    • Credit card number
    • Medical records
    • Bank account number
  3. Briefly describe how the breach was detected.  
  4. Provide the location of breached data (e.g. system name, mobile computing device, storage device, hard copy records, campus, site).
  5. What date did the breach occur and what date was the breach discovered?
  6. Briefly describe the scope of the breach (e.g. the number of data records compromised and/or the number of users that are affected).

Data Breach Assessment, Prioritization, and Response (Response Team)
TTC’s Information Security Liaison will serve as a Breach Response Team manager and coordinate activities.  In the Security Liaison’s absence, the Student Services Chief of Staff will serve as Response Team manager.  In the Chief of Staff’s absence, the Academic Affairs Assistant VP will serve as Response Team manager. 

The Breach Response Team manager will immediately convene the team to perform the following steps:

  1. Validate the data breach:
    1. Has a data breach occurred in violation of a law or regulation?
    2. Is the status of the data breach active or post breach?
    3. What was the method of data disclosure?
      1. Internal, external, malicious, accidental/unintended?
    4. Does the breach impact system functionality?
    5. To what extent does the breach affect faculty, staff, and students?
    6. What is the anticipated reputational and financial impact to the college?
  2. Assign a high or low priority level to the data breach based on current and future impact.
  3. Notify Cabinet of high priority data breaches.
    1. Cabinet, with guidance from TTC’s Legal Liaison and external Legal Counsel, will determine whether to notify law enforcement based on the nature of the breach and federal, state regulations.
    2. Cabinet will designate a college representative with the authority to share breach information to external parties including law enforcement.
  4. Notify data owners and identify all affected data, machines, and devices.
  5. Reference section 2-C (Response to Red Flags) of the Red Flags Rule Identity Theft Prevention Plan and follow applicable steps.
  6. Follow applicable FERPA guidelines.
  7. Document and report on breach response activities and coordinate the flow of information about the breach to TTC employees and contractors.
  8. Locate and preserve (when possible) all written and electronic logs and records applicable to the breach for examination.
  9. Work with data owners and IT staff to mitigate damage and determine the root cause of the breach to prevent future occurrences.
  10. Determine when to notify affected faculty, staff, students, and authorized third parties with guidance from Cabinet, TTC’s Legal Liaison, and external Legal Counsel.
    1. Law Enforcement will provide notification guidance if the breach is under criminal investigation.
  11. Create an appropriate media notification after approval from Cabinet, TTC’s Legal Liaison, external Legal Counsel, and Law Enforcement.
  12. Perform a final assessment of the data breach and ensure that controls are in place to prevent a reoccurrence. Notify Cabinet of low level data breaches after final assessment is complete.


Data Breach Response Phases (Reference)

  1. Identification
  2. Notification to response team
  3. Assessment
  4. Containment
  5. Eradication
  6. Recovery
  7. Documentation
  8. Notify external agencies and customers (if warranted)
  9. Remediation
  10. Lessons learned