Last updated: August 28, 2024

Shared Goal

Protecting UBC information & systems is critical to fulfilling UBC’s vision purpose & values. We partner across the university to support units in identifying and meeting their information security responsibilities. Together we protect the UBC community from a major privacy or information security breach.

 

Indian Residential School History and Dialogue Centre

Program Overview

The Compliance Support Program exists to communicate essential controls, clarify accountability for securing information systems, and support units in understanding their gaps to be able to develop plans and processes to improve security. The program will be systematically engaging with units across UBC in waves. Administrative/Academic Heads of Units must work with the program to identify key stakeholders and allow time to enable their team to support the program.

The attestation will begin focusing on Administrative Heads of Units (both Academic and Administrative portfolios) and IT Representatives. IT Representatives are focal points to gather technical information on controls practiced by each unit, as appointed by each Administrative Head of Unit. In general, they will be the heads of IT departments, where those exist, or the next most suitable staff member to centralize the gathering of the required information e.g. a UBC IT Client Service Manager.

Safety & Operations

I am an Admin Head of Unit

Get Started

CWL Required

IT Rep presentation

I am an IT Representative

Get Started

CWL Required

Campus Security Presentation

Isora GRC Compliance Hub

Get Started

CWL Required

PrISM Team Meeting

Accountability

Securing UBC information & systems in UBC’s custody is of critical importance to fulfill UBC’s vision, purpose & values.

  • The risk of a major privacy/information security breach is one of UBC’s top-rated institutional risks.
  • Administrative Heads of Units are responsible for establishing and maintaining UBC Electronic Information and Systems within their areas of responsibility.
  • In the event of an information security breach, the extent to which the unit can demonstrate compliance with the information systems policy (specifically essential controls) will impact the following decisions:

    1. Cost allocation associated with incident response and recovery
    2. The necessity to conduct a full audit of information security controls within the unit
    3. Performance assessments for individuals who have failed to carry out their responsibilities under the Information Systems policy, including any appropriate performance management or disciplinary measures

    If you would like to learn more about whether you are well-positioned to participate in the compliance support program as the Administrative Head of Unit, please refer to the FAQ section below.

Take Action Now

This program aims to support compliance with essential controls, establish clear accountability for information system security, and assist units in identifying and addressing any existing gaps.

To best prepare for Compliance Support Engagement we kindly request the following proactive steps be taken:

We are the VPFO - cross-functional gatherings to welcome VP Frank Laezza
Cross functional meeting

Participation Benefits 

Participation benefits units by:

  • Assuring that essential controls are in place, a clear path toward improvement and an opportunity to advocate for the support required to provide secure systems
  • Communicating which information security controls are considered essential, helping clarify accountability for securing information systems, and supporting units in understanding their maturity to be able to develop plans and processes to improve security

Available Support

The Compliance Support Program exists to communicate essential controls, help clarify accountability for securing information systems, and support units in understanding their maturity so as to be able to develop plans and processes to improve security. It offers services including:

  • Advice in relation to best practices, UBC support services and technologies are available to support improved maturity
  • Attestation processes for Administrative Heads of Units and their IT Representatives to help surface any significant compliance gaps
  • Continuous follow-up on key risks and mitigations identified
Discussing statistics

Self-Assessment Process

Support from the Compliance Team is available and provided throughout the entire process.

The Compliance Attestation Process is intended to be cyclical, whereas UBC units will be periodically reassessed to ensure privacy and information security are continuously improved.

The Compliance Attestation Process will support any UBC units, including faculties, administrative, and research units.

WEEK 1

Step 1: The Compliance Team sends out introductory communication to the UBC unit.

WEEK 2

Step 2: The Compliance Team and the UBC unit meet for a program overview and stakeholder analysis.

WEEK 3

Step 3: The Compliance Team and the UBC unit meet with Admin Head and IT Rep. Onboarding package is sent out.

WEEKS 4-7

Step 4: The UBC unit provides answers to self-assessment questions.      

WEEKS 8-9

Step 5: The Compliance Team reviews answers and creates a consolidated report.

WEEK 10

Step 6: The Compliance Team and the UBC unit meet to discuss self-assessment outcomes.

WEEKS 11-12

Step 7: A final report is delivered and attestation is signed off by the Admin Head of Unit.

WEEK 13

Step 8: The Compliance Team and the UBC unit meet to discuss remediation opportunities.

ONGOING

Step 9: The Compliance Team monitors the progress of remediation actions with the UBC unit.

 

Meeting at Martha Piper Plaza

FAQFrequently Asked Questions


Go Further...


UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Chats Two speech clouds. Facebook The logo for the Facebook social media service. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Telephone An antique telephone. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service. Bell Warning