{"id":460,"date":"2020-01-27T14:57:55","date_gmt":"2020-01-27T14:57:55","guid":{"rendered":"https:\/\/www.nicholls.edu\/information-tech\/?page_id=460"},"modified":"2024-02-15T16:52:45","modified_gmt":"2024-02-15T21:52:45","slug":"policyandprocedure","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/","title":{"rendered":"IT Policy and Procedure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"460\" class=\"elementor elementor-460\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8a3802 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"d8a3802\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-54fc541\" data-id=\"54fc541\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e6522d9\" data-id=\"e6522d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb1c2f9 elementor-widget elementor-widget-template\" data-id=\"fb1c2f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"653\" class=\"elementor elementor-653\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19046300 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19046300\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38b5dd22\" data-id=\"38b5dd22\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-255e27eb elementor-widget elementor-widget-heading\" data-id=\"255e27eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">QUICK LINKS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a954232 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"3a954232\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/my.nicholls.edu\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">myNicholls<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46062a90 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"46062a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/pwd.nicholls.edu\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">myNicholls ID Password Reset<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59530b78 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"59530b78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/helpdesk.nicholls.edu\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Online Helpdesk (Faculty\/Staff)<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3531d69b elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"3531d69b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.nicholls.edu\/information-tech\/gmail-mobile-setup-instructions\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nicholls Email Login Instructions<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ea6b7c6 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"2ea6b7c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.nicholls.edu\/information-tech\/it-strategic-plan\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">IT Strategic Plan<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f5b6933 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"7f5b6933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.nicholls.edu\/information-tech\/microsoft-office-for-students\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Microsoft Office for Students<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4560881d elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"4560881d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.nicholls.edu\/information-tech\/microsoft-office-for-faculty-and-staff-personal-use\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Microsoft Office for Faculty\/Staff<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07b15a elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"a07b15a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">IT Policies and Procedures<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e0f4c23 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"5e0f4c23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leaving the University<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f54e44 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f54e44\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-37647fb\" data-id=\"37647fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b655d9 elementor-widget elementor-widget-global elementor-global-473 elementor-widget-text-editor\" data-id=\"1b655d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">IT Policy and Procedures\u200b<\/a><\/h2><ul><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\">Acceptable Use Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\">Acceptable Encryption Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-center-access-policy\/\">Data Center Access Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Classification Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/email-policy\/\">Email Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\">IT Audit Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\">Lab Policies<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">Leaving the University<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-1f4a3cf\" data-id=\"1f4a3cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36f2f52 elementor-widget elementor-widget-heading\" data-id=\"36f2f52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Purpose<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5071ad6 elementor-widget elementor-widget-text-editor\" data-id=\"5071ad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNicholls State University maintains certain policies with regard to the use and security of its Information Technology (IT) resources, including computer usage, computer systems and networks. Nicholls State University IT policies exist to maintain, secure, and ensure legal and appropriate use of the university\u2019s information technology infrastructure. Security and privacy policies work together to provide the campus community with a high quality, trusted, and secure campus computing environment. They also help protect and secure property interests, data, and intellectual property. All users of Nicholls State University&#8217;s IT resources and facilities are expected to be familiar with and adhere to the Nicholls State University\u00a0 IT policies and will be subjected to the consequences of and\/or penalties for violating University policies. Nicholls State University\u2019s IT Policies apply to the entire Nicholls community, including faculty, staff, and students.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Email Policy IT Audit Policy Lab Policies Leaving the University Purpose Nicholls State University maintains certain policies with regard to the use and security of its Information Technology (IT) resources, including computer usage, computer systems and networks. Nicholls State University [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-460","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Policy and Procedure - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Policy and Procedure - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Email Policy IT Audit Policy Lab Policies Leaving the University Purpose Nicholls State University maintains certain policies with regard to the use and security of its Information Technology (IT) resources, including computer usage, computer systems and networks. Nicholls State University [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T21:52:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\",\"name\":\"IT Policy and Procedure - Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\"},\"datePublished\":\"2020-01-27T14:57:55+00:00\",\"dateModified\":\"2024-02-15T21:52:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policy and Procedure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\",\"name\":\"Information Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Policy and Procedure - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/","og_locale":"en_US","og_type":"article","og_title":"IT Policy and Procedure - Information Technology","og_description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Email Policy IT Audit Policy Lab Policies Leaving the University Purpose Nicholls State University maintains certain policies with regard to the use and security of its Information Technology (IT) resources, including computer usage, computer systems and networks. Nicholls State University [&hellip;]","og_url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/","og_site_name":"Information Technology","article_modified_time":"2024-02-15T21:52:45+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/","url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/","name":"IT Policy and Procedure - Information Technology","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/#website"},"datePublished":"2020-01-27T14:57:55+00:00","dateModified":"2024-02-15T21:52:45+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/information-tech\/"},{"@type":"ListItem","position":2,"name":"IT Policy and Procedure"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/information-tech\/#website","url":"https:\/\/www.nicholls.edu\/information-tech\/","name":"Information Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Information Technology","distributor_original_site_url":"https:\/\/www.nicholls.edu\/information-tech","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/media?parent=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}