Data Backup
Policy 14.13
| Approved by: | President |
| Responsible Officer: | Chief Information Officer |
| Responsible Office: | Information Technology Services |
| Originally Issued: | 02/09/2026 |
| Last Revision: | New |
| Category: | Technology |
Related Policies
| SD BOR Security of Information Technology Systems Policy 7.4 |
I. Reason for Policy
The purpose of this policy is to establish clear guidelines and procedures for the systematic and secure backup of critical data assets owned or managed by Dakota State University (DSU). A comprehensive backup process reduces the risk of data loss due to system failures, disasters, or human error and ensures the timely restoration of critical information needed for continued operations.
This policy also supports compliance with applicable data security regulations and fosters a culture of proactive data protection and security awareness across the University community.
This policy applies to all University-owned or managed data assets, including academic, research, administrative, financial, and operational records, and all DSU departments, units, and personnel responsible for managing or safeguarding data.
II. Definitions
- Backup. The process of copying data to secondary storage media (e.g., tape, disk, or cloud) to prevent data loss due to system failures or disasters.
- CIO (Chief Information Officer). Campus Chief Information Officer/Vice President of Technology is the department head for the DSU (Dakota State University) technology department.
- Data Recovery. The process of retrieving data from a backup to restore it to a desired point in time.
- Data Trustee: Data Trustees are the university officials with authority over institutional data or the university’s use thereof. Data Trustees are accountable for protecting, managing, and ensuring the integrity of institutional data in accordance with policies, state law, and federal law.
- Institutional Data. Data for which institutional resources or institutionally owned, leased, licensed, or provided technology systems are used to create, manage, transmit, process, or store it, including administrative, instructional, operational, and research data. When institutional systems, devices, funding, or networks are used to create or process research data, the resulting data is considered institutional data regardless of where the researcher is physically located or which device is used at the moment of creation.
- ITS. Information Technology Services. The official technology department for Dakota State University and subsumed departments.
- RPO (Recovery Point Objective). It is the maximum tolerable amount of data loss measured in time. It represents the point in time to which data must be recovered after a disruption, indicating the acceptable data loss window for an organization's backup and recovery processes.
- RTO (Recovery Time Objective). Defines the maximum acceptable downtime for a system after a disruption. It's essential to measure how long a system can tolerate being offline before operations are significantly impacted.
III. Statement of Policy
- Responsibilities
- Data Trustees
- Determine backup requirements, schedules, RPO, and RTO for their data and systems.
- Coordinate with ITS to document and review RPO/RTO values annually.
- Ensure backup retention aligns with operational and compliance requirements.
- Information Technology Services (ITS)
- Implement and manage centralized backup infrastructure.
- Perform regular backups and verify completion.
- Test and validate backups regularly to ensure recoverability.
- Securely store off-site backups following encryption and data classification requirements.
- Maintain documentation of backup records and ensure compliance with DSU and BOR standards.
- Users
- Ensure institutional data is stored only on ITS approved storage systems (on-premises or approved cloud environments).
- Data Trustees
- Backup Strategy
- Full backups: Performed at regular intervals (e.g., weekly) to capture all data.
- Incremental backups: Performed more frequently (e.g., daily) to capture changes since the last full backup.
- Differential backups: Capture changes since the last full or differential backup.
- Backup Storage and Encryption. All backup data must be encrypted in accordance with FIPS 140-2 standards and stored within managed, access-controlled environments. Exfiltration via unencrypted removable drives or non-DSU third-party systems is prohibited.
- Backup Testing. ITS must conduct quarterly restore tests for critical systems and annual tests for all other systems. Test results must be documented and retained for audit.
- 3-2-1 Rule. ITS shall implement the NIST-recommended 3-2-1 backup model:
- Three copies of data (one primary and two backups).
- Two different media types.
- Two different media types.
- Retention and Off-Site Storage. At least one backup per cycle shall be stored off-site in a secure, environmentally controlled location consistent with data classification and retention requirements.
Exclusions
Exfiltration of institutional data outside of the approved OneDrive default backup folders and backup process or designated SharePoint sites is prohibited. Data saved to local user devices or to non-standard OneDrive locations is not included in automated backups and will not be protected. Users are responsible for ensuring that institutional data is stored only within ITS-approved, managed storage locations to ensure it is backed up in accordance with this policy.
Public archive data is excluded from routine backup and recovery services. This includes data intended for long-term retention or historical reference that is publicly accessible, static or infrequently changed, and not required for day-to-day institutional operations.
Exceptions
Any exceptions to this policy shall only be approved with the consent of the CIO.
IV. Procedures (Major)
- ITS Procedures
- Backup Configuration:
- Define backup schedules and job configurations in accordance with Data Trustee requirements.
- Classify data by sensitivity to determine storage and encryption requirements.
- Backup Storage and Encryption:
- Encrypt all backup data in transit and at rest.
- Store encrypted copies off-site in a secure, controlled facility.
- Backup Audit and Logging:
- Review automated backup job logs weekly for errors or anomalies.
- Document completion status, timestamps, and data volumes.
- Backup Validation and Testing:
- Conduct regular restore testing (quarterly for critical systems; annual for others).
- Document test results and report anomalies or failures to the CIO.
- Offsite and 3-2-1 Compliance:
- Maintain compliance with the 3-2-1 rule.
- Ensure at least one copy of backups is securely maintained off-site.
- Retention and Recordkeeping:
- Maintain detailed backup records (media identifiers, contents, storage location, encryption status).
- Retain records per applicable retention schedules and BOR policy 7:4.
- Backup Configuration:
- Data Trustee Procedures
- Coordinate with ITS to define RPO and RTO requirements annually.
- Review backup reports and validation results to ensure data protection meets operational and compliance needs.
- Submit special backup or data restore requests to ITS using the approved Backup Restoration Form/Ticket.
V. Related Documents, Forms, and Tools
Backup Restoration Request (complete a Support ticket)
NIST Special Pub 800-53 Rev. 5 (Security and Privacy Controls)
VI. Policy History
Adopted: 02/09/2026