{"id":126,"date":"2017-07-28T14:38:48","date_gmt":"2017-07-28T14:38:48","guid":{"rendered":"http:\/\/wcsu.wpengine.com\/iti\/?page_id=126"},"modified":"2023-11-06T21:14:07","modified_gmt":"2023-11-06T21:14:07","slug":"policies","status":"publish","type":"page","link":"https:\/\/www.wcsu.edu\/iti\/policies\/","title":{"rendered":"Policies"},"content":{"rendered":"<ul>\n<li><a href=\"http:\/\/wcsu.wpengine.com\/iti\/policies\/antivirus-policy\/\">Antivirus Policy<\/a><\/li>\n<li><a href=\"http:\/\/wcsu.wpengine.com\/iti\/policies\/computerusepolicy\/\">Policies and Guidelines for Computer Use<\/a><\/li>\n<li><a href=\"\/iti\/policies\/csunetpol\/\">CSU Computer Systems and Network Policy<\/a><\/li>\n<li><a href=\"http:\/\/wcsu.wpengine.com\/iti\/shared-drop-off-folder-policy\/\">Shared Drop Off Folder Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.wcsu.edu\/hr\/wp-content\/uploads\/sites\/57\/2019\/11\/Electronic_Monitoring_Notice_0300-2.pdf\">Electronic Monitoring Notice<\/a><\/li>\n<li><a href=\"http:\/\/wcsu.wpengine.com\/iti\/policies\/copyright\/\">Copyright and P2P File Sharing<\/a><\/li>\n<li><a href=\"\/iti\/policies\/ccpolicies\/\">Computer Center Usage Rules &amp; Policies<\/a><\/li>\n<li><a href=\"https:\/\/support.wcsu.edu\/?ht_kb_category=internet&amp;b_id=12070\">Wireless Policy<\/a><\/li>\n<li><a title=\"This document requires Adobe Reader\" href=\"\/iti\/wp-content\/uploads\/sites\/66\/2018\/07\/WCSU-Security-Policy-February-20151.pdf\">Information Security Policy<\/a><\/li>\n<li><a href=\"\/iti\/wp-content\/uploads\/sites\/66\/2018\/07\/Info_Security-Standards_5_24_07.pdf\">CSUS Information Security Standards<\/a><\/li>\n<li><a title=\"This document requires Adobe Reader\" href=\"\/iti\/wp-content\/uploads\/sites\/66\/2018\/07\/wcsu_laptop_policy_0208.pdf\">Laptop Policy<\/a><\/li>\n<\/ul>\n<ul>\n<li class=\"indent\"><a href=\"http:\/\/www.ct.edu\/it\/bor_resolutions\">BOR IT Resolutions<\/a><\/li>\n<li class=\"indent\"><a href=\"https:\/\/www.ct.edu\/it\/policy\">CSCU IT Policies<\/a><\/li>\n<li class=\"indent\"><a href=\"http:\/\/supportcenter.ct.edu\/Service\/standards.asp\">CSCU IT Standards<\/a><\/li>\n<li class=\"indent\"><a href=\"http:\/\/supportcenter.ct.edu\/Service\/securityeducation.asp\">CSCU Data Management Program<\/a><\/li>\n<li class=\"indent\"><a href=\"\/iti\/wp-content\/uploads\/sites\/66\/2018\/07\/ConnSCU-Incident-Response-Procedures-V11.pdf\">ConnSCU Information Security Incident Response Procedures<\/a><\/li>\n<li class=\"indent\"><a href=\"\/iti\/policies\/ccpolicies\/\">Computer Center Usage Rules &amp; Policies<\/a><\/li>\n<li class=\"indent\"><a href=\"\/iti\/policies\/csuspolicy\/\">CSUS Email Policy<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Antivirus Policy Policies and Guidelines for Computer Use CSU Computer Systems and Network Policy Shared Drop Off Folder Policy Electronic Monitoring Notice Copyright and P2P File Sharing Computer Center Usage Rules &amp; Policies Wireless Policy Information Security Policy CSUS Information &hellip;<\/p>\n","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-126","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/comments?post=126"}],"version-history":[{"count":0,"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/pages\/126\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.wcsu.edu\/iti\/wp-json\/wp\/v2\/media?parent=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}