Skip to end of banner
Go to start of banner

8.1 Information Technology

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

Policy TrackingDate
Approved
RevisedJanuary 13, 2014
Reviewed

  1. The President or a designee shall develop and implement procedures to govern the use of information technology and related equipment. Such procedures will adhere to the security standards specified in the IIPS Information Security Manual, Family Educational Rights and Privacy Act, Health Insurance Portability and Accountability Act, Payment Card Industry Data Security Standards, and adhere to federal and state laws.
  2. Where applicable, the Information Technology Users Handbook will be modified to refer to state guidelines. Local policies and procedures will only be issued to supplement or provide clarification of a local requirement or a documented deviation from the published standard.
  3. Other operational procedures, resources, forms, and other guidelines shall be made a part of the College’s Information Technology Users Handbook, which shall be kept current and posted to an area that allows for easy access by employees.

  • No labels