{"id":645,"date":"2022-02-08T15:49:58","date_gmt":"2022-02-08T21:49:58","guid":{"rendered":"https:\/\/policies.dscc.edu\/?page_id=645"},"modified":"2026-04-01T08:36:00","modified_gmt":"2026-04-01T13:36:00","slug":"11-technology-and-information-security-policies","status":"publish","type":"page","link":"https:\/\/policies.dscc.edu\/index.php\/11-technology-and-information-security-policies\/","title":{"rendered":"11 Technology and Information Security Policies"},"content":{"rendered":"<div class=\"nolwrap\">\n<p><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.01.01.00-Information-Technology-Policy.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11010100-information-technology-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:01:01:00 Information Technology Policy<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/11\/11.01.02.00-Personally-Identifiable-Information.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11010200-information-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:01:02:00 Personally Identifiable Information<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.01.03.00-Web-Publishing.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11010300-dscc-web-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:01:03:00 Web Publishing<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.01.04.00-Use-of-E-mail.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11010400-use-of-e-mail\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:01:04:00 Use of E-mail<\/a><\/strong><br><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.01.04.10-Mass-Communications-Policy.pdf\" data-type=\"URL\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>11:01:04:10 Mass Communications<\/strong><\/a><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.01.05.00-Cyber-Incident-Reporting.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11010500-cyber-incident-reporting-and-response-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:01:05:00 Cyber Incident Reporting and Response Policy<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.01.06.00-Cloud-Computing.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11010600-cloud-computing\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:01:06:00 Cloud Computing<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.02.03.00-Monitoring-and-Filtering-Internet-Use.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11020300-monitoring-and-filtering-internet-use\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:02:03:00 Monitoring and Filtering Internet Use<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.02.04.00-Computing-Network-and-Communications-Acceptable-Use.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11020400-computing-network-and-communications-acceptable-use\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:02:04:00 Computing, Network and Communications Acceptable Use<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/06\/11.02.05.00-Administrative-Software-Usage.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11020500-administrative-software-usage\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:02:05:00 Administrative Software Usage<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.03.02.00-Cellular-Phone-Allowance.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11030200-cellular-phone-allowance\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:03:02:00 Cellular Phone Allowance<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/10\/11.04.01.00-Identity-Theft-Detection-and-Prevention.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040100-identity-theft-detection-and-prevention\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:01:00 Identity Theft Detection and Prevention<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.02.00-Authorized-Use-of-Copyright-Materials.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040200-authorized-use-of-copyrighted-materials\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:02:00 Authorized Use of Copyrighted Materials<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2026\/03\/11.04.03.00-Intellectual-Property.pdf\" data-type=\"URL\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:03:00 Intellectual Property<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.04.00-Electronic-Signatures.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040400-dscc-electronic-signature-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:04:00 DSCC Electronic Signatures<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/11\/11.04.05.00-Digital-Identity-Authentication-Management-and-Access-Control.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040500-password-management-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:05:00 Digital Identity, Authentication Management, and Access Control<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.06.00-Enterprise-Information-Systems-Updates.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040600-enterprise-information-systems-updates-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:06:00 Enterprise Information Systems Updates<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.07.00-Information-Technology-Service-Requests.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040700-information-technology-service-request-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:07:00 Information Technology Service Requests<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.08.00-Information-Technology-Vendor-Management.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040800-information-technology-vendor-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:08:00 Information Technology Vendor Management<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.09.00-Mobile-Device-Management.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11040900-portable-computational-mobile-device\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:09:00 Mobile Device Management<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/08\/11.04.10.00-Information-Technology-Change-Management.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11041000-information-technology-change-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:04:10:00 Information Technology Change Management<\/a><\/strong><br><strong><a href=\"https:\/\/policies.dscc.edu\/wp-content\/uploads\/2024\/11\/11.05.01.00-Media-Services.pdf\" data-type=\"URL\" data-id=\"https:\/\/policies.dscc.edu\/index.php\/11041000-information-technology-change-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">11:05:01:00 Media Services<\/a><\/strong><\/p>\n\n\n\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>11:01:01:00 Information Technology Policy11:01:02:00 Personally Identifiable Information11:01:03:00 Web Publishing11:01:04:00 Use of E-mail11:01:04:10 Mass Communications11:01:05:00 Cyber Incident Reporting and Response Policy11:01:06:00 Cloud Computing11:02:03:00 Monitoring and Filtering Internet Use11:02:04:00 Computing, Network and Communications Acceptable Use11:02:05:00 Administrative Software Usage11:03:02:00 Cellular Phone Allowance11:04:01:00 Identity &hellip; <a href=\"https:\/\/policies.dscc.edu\/index.php\/11-technology-and-information-security-policies\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-645","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/pages\/645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/comments?post=645"}],"version-history":[{"count":28,"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/pages\/645\/revisions"}],"predecessor-version":[{"id":3255,"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/pages\/645\/revisions\/3255"}],"wp:attachment":[{"href":"https:\/\/policies.dscc.edu\/index.php\/wp-json\/wp\/v2\/media?parent=645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}