Skip to main content

6.22 EVENT LOGGING

Effective: August 15, 2024

Purpose: Emporia State University is committed to maintaining the confidentiality, integrity, and accessibility of the information it owns or controls.  Logging the details of events that occur within the University information infrastructure is vital to business continuity, detection of malicious activity, and developing a knowledge base for future actions.

The purpose of this policy is to ensure that important information is gathered to permit support personnel to properly maintain University systems and permit process auditing to verify information assets remain secure.

Scope: The scope of this policy encompasses all wired and wireless hardware devices and all installed software connecting to the University network.

Responsible Office: Information Technology

Policy Statement: Information Technology (IT) is responsible to ensure logging is enabled and to maintain an accurate record of system activity on systems it manages.

Unit Support Personnel are responsible to ensure their systems meet the Event Logging Standards.

The Information Security Officer (ISO) is responsible for monitoring and reporting compliance with this policy.  Review of this policy will occur on an annual basis.

This policy applies to all technology related infrastructure devices that process University information assets. This policy does not include any device on the University’s premises not owned or maintained by the University.

An audit trail of system activity will be maintained for each system, and for each type of user, including system administrators. This information will be reviewed regularly. The information gathered includes but is not limited to:

  • Date, time, type, and any applicable error condition of the event;
  • The ID of the user who caused the event;
  • The application and device that created the event; and
  • Logon and logoff events.

The types of events that should be recorded will be documented in the Event Logging Standards for a given system or application.

The President or designee must approve any exceptions to this policy.

Definitions: All words and phrases shall be interpreted utilizing their plain meanings unless otherwise defined in another University or Board of Regents policy or by statute or regulation.

Procedures: All procedures linked and related to the policies above shall have the full force and effect of policy if said procedures have first been properly approved by the University’s administrator in charge of Information Technology.

[Information Technology procedures - coming soon]

Related Policy Information: [coming soon]

History and Revisions

Adoption Date:
10/20/2006 [FSB 06006 passed by Faculty Senate on 10/03/2006, approved by President, and included in UPM as Policy 3J.22]
Revision Date:
04/24/2009 [FSB 08018 passed by Faculty Senate on 04/21/2009 and approved by President]
10/02/2013 [Policy updated]
11/12/2019 [Policy updated by IS]
02/18/2020 [Policy removed from Faculty Senate]
02/19/2020 [Policy approved by ISAC]
08/15/2024 [Policy format revised as part of UPM Revision]