Technology Policies

INFORMATION SECURITY POLICY

In order to support sound College-wide information security practices, compliance with various State and Federal legislation, and with various industry standards and best practices, this 澳门金沙投注_任你博-官网 Security Policy applies to all organizations within the College, and to all authorized Users of College 澳门金沙投注_任你博-官网 Resources. Instances of non-compliance must be reported to the Department of Technology and reviewed and approved by the Technology staff.

College 澳门金沙投注_任你博-官网 Resources are among the College's most valuable assets, and must be managed in a manner that supports appropriate levels of information integrity, confidentiality, and availability for lawful educational and business purposes.

This document contains a high-level information security policy for use by all College faculty, staff, administrators, consultants, contractors, students and other Users of the College's information technology resources.

All Users shall adhere to the requirements of this Security Policy, and to the requirements of other applicable College policies, standards, and mandatory procedures. All Users shall also comply with any applicable legal or regulatory requirements, and ethical or contractual obligations.

Note: Throughout this Security Policy the terms "data" and "information" are used interchangeably.

Please see the attached PDF below for 澳门金沙投注_任你博-官网's 澳门金沙投注_任你博-官网 Security Policy:

澳门金沙投注_任你博-官网 澳门金沙投注_任你博-官网 Technology Policy

This page was last updated on 01/14/2020.