{"id":874,"date":"2025-10-29T09:46:36","date_gmt":"2025-10-29T14:46:36","guid":{"rendered":"https:\/\/www.nicholls.edu\/information-tech\/?page_id=874"},"modified":"2025-10-29T09:48:17","modified_gmt":"2025-10-29T14:48:17","slug":"acceptable-encryption-policy","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/","title":{"rendered":"ACCEPTABLE ENCRYPTION POLICY"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"874\" class=\"elementor elementor-874\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d5ae81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d5ae81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3f1ce1\" data-id=\"e3f1ce1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ae500b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae500b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0c9b2c3\" data-id=\"0c9b2c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a01332 elementor-widget elementor-widget-global elementor-global-473 elementor-widget-text-editor\" data-id=\"4a01332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">IT Policy and Procedures\u200b<\/a><\/h2><ul><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\">Acceptable Use Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\">Acceptable Encryption Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-center-access-policy\/\">Data Center Access Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Classification Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/email-policy\/\">Email Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\">IT Audit Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\">Lab Policies<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">Leaving the University<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27edaa4\" data-id=\"27edaa4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f3f042 elementor-widget elementor-widget-heading\" data-id=\"7f3f042\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font color=\"#000000\"><span style=\"font-size: 40px\">ACCEPTABLE ENCRYPTION POLICY<\/span><\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92765b7 elementor-widget elementor-widget-embedpres_document\" data-id=\"92765b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embedpres_document.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"embedpress-document-embed ep-doc-fe59f106380a4a3bfaea7462a23b42d0 ose-document \" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\">\n\n                        <div >\n\n                <div id=\"ep-elementor-content-92765b7\" class=\"ep-elementor-content    ep-content-protection-disabled\">\n                    <div id=\"92765b7\" class=\"ep-embed-content-wraper\">\n                        <div class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7\" data-emid=\"embedpress-pdf-92765b7\" data-embedpress-content=\"156c0bc68111ad6d847fd6be8d9aa13d\" data-embed-type=\"Document\" data-emsrc=\"https:\/\/www.nicholls.edu\/information-tech\/wp-content\/uploads\/sites\/30\/2025\/10\/Nicholls-State-University-Acceptable-Encryption-Policy-July-2024.pdf\"><iframe title=\"Nicholls State University &#8211; Acceptable Encryption Policy &#8211; July 2024\" class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7 lazyload\" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\" data-src=\"https:\/\/www.nicholls.edu\/information-tech\/wp-admin\/admin-ajax.php?action=get_viewer&#038;file=https%3A%2F%2Fwww.nicholls.edu%2Finformation-tech%2Fwp-content%2Fuploads%2Fsites%2F30%2F2025%2F10%2FNicholls-State-University-Acceptable-Encryption-Policy-July-2024.pdf#key=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\" frameborder=\"0\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" data-load-mode=\"1\"><\/iframe><p class=\"embedpress-el-powered\">Powered By EmbedPress<\/p><\/div>                    <\/div>\n                <\/div>\n                            <\/div>\n        <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University ACCEPTABLE ENCRYPTION POLICY Powered By EmbedPress<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":460,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-874","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ACCEPTABLE ENCRYPTION POLICY - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ACCEPTABLE ENCRYPTION POLICY - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University ACCEPTABLE ENCRYPTION POLICY Powered By EmbedPress\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T14:48:17+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/acceptable-encryption-policy\\\/\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/acceptable-encryption-policy\\\/\",\"name\":\"ACCEPTABLE ENCRYPTION POLICY - Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\"},\"datePublished\":\"2025-10-29T14:46:36+00:00\",\"dateModified\":\"2025-10-29T14:48:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/acceptable-encryption-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/acceptable-encryption-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/acceptable-encryption-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policy and Procedure\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ACCEPTABLE ENCRYPTION POLICY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\",\"name\":\"Information Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ACCEPTABLE ENCRYPTION POLICY - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/","og_locale":"en_US","og_type":"article","og_title":"ACCEPTABLE ENCRYPTION POLICY - Information Technology","og_description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University ACCEPTABLE ENCRYPTION POLICY Powered By EmbedPress","og_url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/","og_site_name":"Information Technology","article_modified_time":"2025-10-29T14:48:17+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/","url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/","name":"ACCEPTABLE ENCRYPTION POLICY - Information Technology","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/#website"},"datePublished":"2025-10-29T14:46:36+00:00","dateModified":"2025-10-29T14:48:17+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/information-tech\/"},{"@type":"ListItem","position":2,"name":"IT Policy and Procedure","item":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/"},{"@type":"ListItem","position":3,"name":"ACCEPTABLE ENCRYPTION POLICY"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/information-tech\/#website","url":"https:\/\/www.nicholls.edu\/information-tech\/","name":"Information Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Information Technology","distributor_original_site_url":"https:\/\/www.nicholls.edu\/information-tech","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/comments?post=874"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/874\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/media?parent=874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}