{"version":"1.0","provider_name":"Information Technology","provider_url":"https:\/\/www.nicholls.edu\/information-tech","author_name":"cusey","author_url":"https:\/\/www.nicholls.edu\/information-tech\/author\/cusey\/","title":"IT Policy and Procedure - Information Technology","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3IE1wIXTs8\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">IT Policy and Procedure<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/embed\/#?secret=3IE1wIXTs8\" width=\"600\" height=\"338\" title=\"&#8220;IT Policy and Procedure&#8221; &#8212; Information Technology\" data-secret=\"3IE1wIXTs8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.nicholls.edu\/information-tech\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Email Policy IT Audit Policy Lab Policies Leaving the University Purpose Nicholls State University maintains certain policies with regard to the use and security of its Information Technology (IT) resources, including computer usage, computer systems and networks. Nicholls State University [&hellip;]"}