{"id":879,"date":"2025-10-29T10:07:00","date_gmt":"2025-10-29T15:07:00","guid":{"rendered":"https:\/\/www.nicholls.edu\/information-tech\/?page_id=879"},"modified":"2025-10-29T10:08:16","modified_gmt":"2025-10-29T15:08:16","slug":"it-audit-policy","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/","title":{"rendered":"IT Audit Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"879\" class=\"elementor elementor-879\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d5ae81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d5ae81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3f1ce1\" data-id=\"e3f1ce1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ae500b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae500b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0c9b2c3\" data-id=\"0c9b2c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a01332 elementor-widget elementor-widget-global elementor-global-473 elementor-widget-text-editor\" data-id=\"4a01332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">IT Policy and Procedures\u200b<\/a><\/h2><ul><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\">Acceptable Use Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\">Acceptable Encryption Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-center-access-policy\/\">Data Center Access Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Classification Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/email-policy\/\">Email Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\">IT Audit Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\">Lab Policies<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">Leaving the University<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27edaa4\" data-id=\"27edaa4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f3f042 elementor-widget elementor-widget-heading\" data-id=\"7f3f042\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font color=\"#000000\"><span style=\"font-size: 40px\">IT AUDIT POLICY<\/span><\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92765b7 elementor-widget elementor-widget-embedpres_document\" data-id=\"92765b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embedpres_document.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"embedpress-document-embed ep-doc-fe59f106380a4a3bfaea7462a23b42d0 ose-document \" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\">\n\n                        <div >\n\n                <div id=\"ep-elementor-content-92765b7\" class=\"ep-elementor-content    ep-content-protection-disabled\">\n                    <div id=\"92765b7\" class=\"ep-embed-content-wraper\">\n                        <div class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7\" data-emid=\"embedpress-pdf-92765b7\" data-embedpress-content=\"785f3bb33ed83d5638a38a5a6560c102\" data-embed-type=\"Document\" data-emsrc=\"https:\/\/www.nicholls.edu\/information-tech\/wp-content\/uploads\/sites\/30\/2025\/10\/Nicholls-State-University-IT-Audit-Policy-July-2024.pdf\"><iframe title=\"Nicholls State University &#8211; IT Audit Policy &#8211; July 2024\" class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7 lazyload\" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\" data-src=\"https:\/\/www.nicholls.edu\/information-tech\/wp-admin\/admin-ajax.php?action=get_viewer&#038;file=https%3A%2F%2Fwww.nicholls.edu%2Finformation-tech%2Fwp-content%2Fuploads%2Fsites%2F30%2F2025%2F10%2FNicholls-State-University-IT-Audit-Policy-July-2024.pdf#key=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\" frameborder=\"0\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" data-load-mode=\"1\"><\/iframe><p class=\"embedpress-el-powered\">Powered By EmbedPress<\/p><\/div>                    <\/div>\n                <\/div>\n                            <\/div>\n        <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University IT AUDIT POLICY Powered By EmbedPress<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":460,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-879","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Audit Policy - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Audit Policy - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University IT AUDIT POLICY Powered By EmbedPress\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T15:08:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-audit-policy\\\/\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-audit-policy\\\/\",\"name\":\"IT Audit Policy - Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\"},\"datePublished\":\"2025-10-29T15:07:00+00:00\",\"dateModified\":\"2025-10-29T15:08:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-audit-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-audit-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/it-audit-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policy and Procedure\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Audit Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\",\"name\":\"Information Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Audit Policy - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/","og_locale":"en_US","og_type":"article","og_title":"IT Audit Policy - Information Technology","og_description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University IT AUDIT POLICY Powered By EmbedPress","og_url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/","og_site_name":"Information Technology","article_modified_time":"2025-10-29T15:08:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/","url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/","name":"IT Audit Policy - Information Technology","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/#website"},"datePublished":"2025-10-29T15:07:00+00:00","dateModified":"2025-10-29T15:08:16+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/information-tech\/"},{"@type":"ListItem","position":2,"name":"IT Policy and Procedure","item":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/"},{"@type":"ListItem","position":3,"name":"IT Audit Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/information-tech\/#website","url":"https:\/\/www.nicholls.edu\/information-tech\/","name":"Information Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/comments?post=879"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/879\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/media?parent=879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}