{"id":77,"date":"2020-04-26T23:00:52","date_gmt":"2020-04-26T23:00:52","guid":{"rendered":"https:\/\/www.jsums.edu\/cyberawareclone-demo\/?page_id=77"},"modified":"2026-04-24T21:01:08","modified_gmt":"2026-04-24T21:01:08","slug":"jsu-information-technology-policies","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/jsu-information-technology-policies\/","title":{"rendered":"JSU Information Technology Policies"},"content":{"rendered":"<p><strong>The following Documents contain policies and guidelines\u00a0to identify, define, and outline how to securely handle, discard, and report the inappropriate use of University student data according to the requirements of the FERPA, GLBA, HIPAA Acts.\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"color: 002147;\">IT POLICY DOCUMENTS<\/span><\/strong><\/p>\n<p><strong>Acceptable Use Policies<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/acceptable-use\/\">Acceptable Use Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/acceptable-use-email\/\">Acceptable Use Policy: Email<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/acceptable-use-wireless-devices\/\">Acceptable Use Policy: Wireless Communications Devices<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/acceptable-use-vpn\/\">Acceptable Use Policy: Virtual Private Network<\/a><\/li>\n<\/ul>\n<p><strong>Access Control Policies<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/system-access\/\">System Access Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/wireless-access\/\">Wireless Access Policy<\/a><\/li>\n<\/ul>\n<p><strong>Awareness &amp; Training Policies<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/security-awareness\/\">Security Awareness Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/cui-security-training-policy\/\">Security Training Policy<\/a><\/li>\n<\/ul>\n<p><strong>Data<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/data-definitions\/\">Data Security Definitions<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/data-security\/\">Data Security Policy<\/a><\/li>\n<\/ul>\n<p><strong>Device &amp; Account Security<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/byod-policy\/\">Bring Your Own Device (BYOD) Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/inventory-management\/\">Inventory Management Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/mobile-security\/\">Mobile Device Security Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/password-secure\/\">Password Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/patch-management\/\">Patch Management Policy<\/a><\/li>\n<\/ul>\n<p><b>Incident Management<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/incident-response\/\">Incident Response Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/security-incident-response\/\">Information Security Incident Response Policy(Data Breach)<\/a><\/li>\n<\/ul>\n<p><b>Risk Management<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/vendor-security\/\">Third Party Vendor Security Management Policy<\/a><\/li>\n<\/ul>\n<p><b>Miscellaneous<\/b><strong> Policies &amp; Programs<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/clean-desk\/\">Clean Desk Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/marketplace-privacy-policy\/\">JSU Market Place Privacy Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/marketplace-refund-policy\/\">JSU Market Place Refund Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/files\/2023\/08\/JSU-Phishing_Management_Program-2023.pdf\">JSU Phishing Management Program\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/files\/2023\/08\/JSU-Vendor-Management_Program-2023.pdf\">JSU Vendor Management Program<\/a><\/li>\n<li><a href=\"https:\/\/www.jsums.edu\/jsu-cyber-security\/networkshare-storage\/\">Systems-Network Share and Storage Policy<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following Documents contain policies and guidelines\u00a0to identify, define, and outline how to securely handle, discard, and report the inappropriate use of University student data according to the requirements of the FERPA, GLBA, HIPAA Acts.\u00a0 &nbsp; IT POLICY DOCUMENTS Acceptable Use Policies Acceptable Use Policy Acceptable Use Policy: Email Acceptable Use Policy: Wireless Communications Devices [&hellip;]<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/77"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":6,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/77\/revisions"}],"predecessor-version":[{"id":1544,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/77\/revisions\/1544"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}