{"id":3896,"date":"2022-07-11T13:54:03","date_gmt":"2022-07-11T18:54:03","guid":{"rendered":"https:\/\/www.jsums.edu\/informationtechnology\/?page_id=3896"},"modified":"2025-01-15T11:22:08","modified_gmt":"2025-01-15T17:22:08","slug":"it-forms","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/informationtechnology\/it-forms\/","title":{"rendered":"IT Forms"},"content":{"rendered":"<h2 class=\"kingster-page-title\"><span style=\"color: #000000;\">IT Forms<\/span><\/h2>\n<p><span style=\"color: #009bde;\"><a style=\"color: #009bde;\" href=\"https:\/\/www.jsums.edu\/informationtechnology\/it-purchasing-policyforms\/\">IT Purchasing Forms<\/a><\/span><\/p>\n<p><span style=\"color: #009bde;\"><a style=\"color: #009bde;\" href=\"https:\/\/www.jsums.edu\/informationtechnology\/files\/2022\/07\/JSU_VPN_User_infromation_Form.pdf\">Virtual Private Network (VPN) Access Form<\/a><\/span><\/p>\n<p><span style=\"color: #009bde;\"><a style=\"color: #009bde;\" href=\"https:\/\/jsumscentral.etrieve.cloud\/\"><span style=\"font-weight: 400;\">Faculty &amp; Staff VPN Access Form<\/span><\/a><\/span><\/p>\n<p><span style=\"color: #009bde;\"><a style=\"color: #009bde;\" href=\"https:\/\/jsumscentral.etrieve.cloud\/\"><span style=\"font-weight: 400;\">Vendor VPN Access Form<\/span><\/a><\/span><\/p>\n<p><span style=\"color: #009bde;\"><a style=\"color: #009bde;\" href=\"https:\/\/jsumscentral.etrieve.cloud\/\"><span style=\"font-weight: 400;\">Web Contributor Access Form<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Forms IT Purchasing Forms Virtual Private Network (VPN) Access Form Faculty &amp; Staff VPN Access Form Vendor VPN Access Form Web Contributor Access Form<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/pages\/3896"}],"collection":[{"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/comments?post=3896"}],"version-history":[{"count":5,"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/pages\/3896\/revisions"}],"predecessor-version":[{"id":4144,"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/pages\/3896\/revisions\/4144"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/informationtechnology\/wp-json\/wp\/v2\/media?parent=3896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}