Skip to main content
Back To Top Top Back To Top
This website publishes administrative rules on their effective dates, as designated by the adopting state agencies, colleges, and universities.

Rule 4731-8-06 | Restricting and logging access to confidential personal information in computerized personal information systems.

 

For personal information systems that are computer systems and contain confidential personal information, the board shall do the following:

(A) Access restrictions. Access to confidential personal information that is kept electronically shall require a password or other authentication measure.

(B) Acquisition of a new computer system. When the board acquires a new computer system that stores, manages or contains confidential personal information, the board shall include a mechanism for recording specific access by employees of the board to confidential personal information in the system.

(C) Upgrading existing computer systems. When the board makes an upgrade to a computer system, as that term is defined in rule 4731-8-02 of the Administrative Code, to an existing computer system that stores, manages or contains confidential personal information, the upgrade shall include a mechanism for recording specific access by employees of the board to confidential personal information in the system.

(D) Logging requirements regarding confidential personal information in existing computer systems.

(1) Employees who access confidential personal information within computer systems shall maintain a log that records that access.

(2) Access to confidential information is not required to be entered into a log under the following circumstances:

(a) The employee is accessing confidential personal information for official board purposes, including research, and the access is not specifically directed toward a specifically named individual or a group of specifically named individuals.

(b) The employee is accessing confidential personal information for routine office procedures and the access is not specifically directed toward a specifically named individual or a group of specifically named individuals.

(c) The employee comes into incidental contact with confidential personal information and the access of the information is not specifically directed toward a specifically named individual or a group of specifically named individuals.

(d) The employee accesses confidential personal information about an individual based upon a request made under either of the following circumstances:

(i) The individual requests confidential personal information about himself/herself; or

(ii) The individual makes a request that the board take some action on that individual's behalf and accessing the confidential personal information is required in order to consider or process that request.

(E) Log management. The board shall issue a policy that specifies the following:

(1) The form or forms for logging;

(2) Who shall maintain the logs;

(3) What information shall be captured in the logs;

(4) How the logs are to be stored; and

(5) How long information kept in the logs is to be retained.

(F) Nothing in this rule limits the board from requiring logging in any circumstance that it deems necessary.

Last updated February 28, 2023 at 12:49 PM

Supplemental Information

Authorized By: 1347.15
Amplifies: 1347.15
Five Year Review Date: 2/11/2026