
{"id":1045,"date":"2012-06-16T06:35:46","date_gmt":"2012-06-16T06:35:46","guid":{"rendered":"http:\/\/www.berea.edu\/iss\/?page_id=5"},"modified":"2023-02-21T15:13:07","modified_gmt":"2023-02-21T20:13:07","slug":"policies-and-guidelines","status":"publish","type":"page","link":"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/","title":{"rendered":"Policies and Guidelines"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<ul>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Berea_College_Information_Technology_Security_Program.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Berea College Information Technology Security Program<\/a><\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Banner_Data_Change_Policy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Banner Data Change Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/07\/banner-security-and-access-policy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Banner Security and Access Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Banner_Testing_and_Change_Management_Procedure.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Banner Testing and Change Management Procedure<\/a><\/li>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Berea_College_Account_Management_Procedure.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Berea College Account Management Procedure<\/a><\/li>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Berea_College_Incident_Response_Plan.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Berea College Incident Response Plan<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2012\/06\/Data_Centers_Access_Procedure.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Berea College Data Centers Access Procedure<\/a><\/li>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/PCI_Policy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Berea College PCI Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Berea_College_User_Accounts_Policy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Berea College User Accounts Policy<\/a><\/li>\n<li class=\"listlink\"><a href=\"http:\/\/berea.smartcatalogiq.com\/en\/Current\/Catalog\/Selected-Institution-Wide-Policies\/Computer-and-Network-Policy\" target=\"_blank\" rel=\"noopener noreferrer\">Computer and Network Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2017\/02\/Computer_Data_Storage_and_Security_Policy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Data Storage and Security Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/09\/Copyright_Infringement_Notice_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Copyright Infringement\u00a0Policy<\/a><\/li>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/Backup_and_Disaster_Recovery_Scheme.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Critical IT Services Backup Schedule<\/a><\/li>\n<li><a href=\"https:\/\/secure.berea.edu\/secure\/myberea\/documents\/General_Guidance_on_Information_Security.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">General Guidance on Information Security<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2012\/06\/BC-IT-Equipment-Acquisition-and-Disposal-Policy2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">IT Assets\u00a0Acquisition and Disposal Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2012\/06\/ISS_Planned_Service_Maintenance.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Major IT Services Maintenance Schedule<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2013\/09\/Mobile-Security-Policy.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Security Policy<\/a><\/li>\n<li class=\"listlink\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/11\/Network-Guidelines-PDF-public.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Network Usage Guidelines<\/a><\/li>\n<li class=\"listpdf\"><a href=\"\/iss\/wp-content\/uploads\/sites\/133\/2012\/08\/P2PFileSharing.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Peer-to-Peer (P2P) File Sharing Policy<\/a><\/li>\n<li class=\"listpdf\"><a href=\"\/iss\/wp-content\/uploads\/sites\/133\/2012\/08\/Renovation-Guidelines-for-Network-Infrustructure.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Renovation Guidelines for Network Infrastructure<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/09\/Equipment-Refresh-Guidelines-Approved-2023-2024.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Students &amp; Faculty\/Staff Laptop Refresh Guidelines<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2012\/06\/Service-Workstation-Guidelines.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Service Workstation Guidelines<\/a><\/li>\n<\/ul>\n<p><strong>Passphrase Guides<\/strong><\/p>\n<ul>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2012\/06\/Passphrase-Guidelines.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Passphrase Guidelines<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/09\/Passphrase-Best-Practices.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Passphrase Best-Practices<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2012\/06\/Password_Change_PWC_2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Passphrase Change &#8211; passphrase.berea.edu<\/a><\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/09\/Password-Change-Win.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Passphrase Change<\/a> &#8211;\u00a0Windows desktop<\/li>\n<li class=\"listpdf\"><a href=\"https:\/\/legacy.berea.edu\/iss\/wp-content\/uploads\/sites\/133\/2016\/09\/Password-Change-Mac.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Passphrase Change<\/a>\u00a0&#8211;\u00a0Mac desktop<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Berea College Information Technology Security Program Banner Data Change Policy Banner Security and Access Policy Banner Testing and Change Management Procedure Berea College Account Management Procedure Berea College Incident Response Plan Berea College Data Centers Access Procedure Berea College PCI Policy Berea College User Accounts Policy Computer and Network Policy Computer Data Storage and [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1045","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Policies and Guidelines - Information Systems and Services - IS&amp;S<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Policies and Guidelines - Information Systems and Services - IS&amp;S\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text] Berea College Information Technology Security Program Banner Data Change Policy Banner Security and Access Policy Banner Testing and Change Management Procedure Berea College Account Management Procedure Berea College Incident Response Plan Berea College Data Centers Access Procedure Berea College PCI Policy Berea College User Accounts Policy Computer and Network Policy Computer Data Storage and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Systems and Services - IS&amp;S\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-21T20:13:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/policies-and-guidelines\\\/\",\"url\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/policies-and-guidelines\\\/\",\"name\":\"Policies and Guidelines - Information Systems and Services - IS&amp;S\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/#website\"},\"datePublished\":\"2012-06-16T06:35:46+00:00\",\"dateModified\":\"2023-02-21T20:13:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/policies-and-guidelines\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/policies-and-guidelines\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/policies-and-guidelines\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Policies and Guidelines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/#website\",\"url\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/\",\"name\":\"Information Systems and Services - IS&amp;S\",\"description\":\"Information Systems and Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/legacy.berea.edu\\\/iss\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Policies and Guidelines - Information Systems and Services - IS&amp;S","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Policies and Guidelines - Information Systems and Services - IS&amp;S","og_description":"[vc_row][vc_column][vc_column_text] Berea College Information Technology Security Program Banner Data Change Policy Banner Security and Access Policy Banner Testing and Change Management Procedure Berea College Account Management Procedure Berea College Incident Response Plan Berea College Data Centers Access Procedure Berea College PCI Policy Berea College User Accounts Policy Computer and Network Policy Computer Data Storage and [&hellip;]","og_url":"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/","og_site_name":"Information Systems and Services - IS&amp;S","article_modified_time":"2023-02-21T20:13:07+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/","url":"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/","name":"Policies and Guidelines - Information Systems and Services - IS&amp;S","isPartOf":{"@id":"https:\/\/legacy.berea.edu\/iss\/#website"},"datePublished":"2012-06-16T06:35:46+00:00","dateModified":"2023-02-21T20:13:07+00:00","breadcrumb":{"@id":"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.berea.edu\/iss\/policies-and-guidelines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.berea.edu\/iss\/"},{"@type":"ListItem","position":2,"name":"Policies and Guidelines"}]},{"@type":"WebSite","@id":"https:\/\/legacy.berea.edu\/iss\/#website","url":"https:\/\/legacy.berea.edu\/iss\/","name":"Information Systems and Services - IS&amp;S","description":"Information Systems and Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.berea.edu\/iss\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/pages\/1045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/comments?post=1045"}],"version-history":[{"count":0,"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/pages\/1045\/revisions"}],"wp:attachment":[{"href":"https:\/\/legacy.berea.edu\/iss\/wp-json\/wp\/v2\/media?parent=1045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}