{"id":881,"date":"2025-10-29T10:11:19","date_gmt":"2025-10-29T15:11:19","guid":{"rendered":"https:\/\/www.nicholls.edu\/information-tech\/?page_id=881"},"modified":"2025-10-29T10:13:02","modified_gmt":"2025-10-29T15:13:02","slug":"lab-policies","status":"publish","type":"page","link":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/","title":{"rendered":"Lab Policies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"881\" class=\"elementor elementor-881\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d5ae81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d5ae81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3f1ce1\" data-id=\"e3f1ce1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ae500b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae500b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0c9b2c3\" data-id=\"0c9b2c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a01332 elementor-widget elementor-widget-global elementor-global-473 elementor-widget-text-editor\" data-id=\"4a01332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\"><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/\">IT Policy and Procedures\u200b<\/a><\/h2><ul><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-acceptable-use-policy\/\">Acceptable Use Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/acceptable-encryption-policy\/\">Acceptable Encryption Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-center-access-policy\/\">Data Center Access Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/data-classification-policy\/\">Data Classification Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/email-policy\/\">Email Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/it-audit-policy\/\">IT Audit Policy<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\">Lab Policies<\/a><\/li><li><a href=\"https:\/\/www.nicholls.edu\/information-tech\/leaving-the-university\/\">Leaving the University<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27edaa4\" data-id=\"27edaa4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f3f042 elementor-widget elementor-widget-heading\" data-id=\"7f3f042\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font color=\"#000000\"><span style=\"font-size: 40px\">LAB POLICY<\/span><\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92765b7 elementor-widget elementor-widget-embedpres_document\" data-id=\"92765b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embedpres_document.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"embedpress-document-embed ep-doc-fe59f106380a4a3bfaea7462a23b42d0 ose-document \" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\">\n\n                        <div >\n\n                <div id=\"ep-elementor-content-92765b7\" class=\"ep-elementor-content    ep-content-protection-disabled\">\n                    <div id=\"92765b7\" class=\"ep-embed-content-wraper\">\n                        <div class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7\" data-emid=\"embedpress-pdf-92765b7\" data-embedpress-content=\"ec1d59b8b074247c92c98778f84325a2\" data-embed-type=\"Document\" data-emsrc=\"https:\/\/www.nicholls.edu\/information-tech\/wp-content\/uploads\/sites\/30\/2025\/10\/Nicholls-State-University-Lab-Policy-September-2019.pdf\"><iframe title=\"Nicholls State University &#8211; Lab Policy &#8211; September 2019\" class=\"embedpress-embed-document-pdf embedpress-pdf-92765b7 lazyload\" style=\"width: 600px; height: 600px; max-width:100%; display: inline-block\" data-src=\"https:\/\/www.nicholls.edu\/information-tech\/wp-admin\/admin-ajax.php?action=get_viewer&#038;file=https%3A%2F%2Fwww.nicholls.edu%2Finformation-tech%2Fwp-content%2Fuploads%2Fsites%2F30%2F2025%2F10%2FNicholls-State-University-Lab-Policy-September-2019.pdf#key=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\" frameborder=\"0\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" data-load-mode=\"1\"><\/iframe><p class=\"embedpress-el-powered\">Powered By EmbedPress<\/p><\/div>                    <\/div>\n                <\/div>\n                            <\/div>\n        <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University LAB POLICY Powered By EmbedPress<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":460,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-881","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lab Policies - Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lab Policies - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University LAB POLICY Powered By EmbedPress\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T15:13:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/lab-policies\\\/\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/lab-policies\\\/\",\"name\":\"Lab Policies - Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\"},\"datePublished\":\"2025-10-29T15:11:19+00:00\",\"dateModified\":\"2025-10-29T15:13:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/lab-policies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/lab-policies\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/lab-policies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policy and Procedure\",\"item\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/policyandprocedure\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lab Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/#website\",\"url\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/\",\"name\":\"Information Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nicholls.edu\\\/information-tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lab Policies - Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/","og_locale":"en_US","og_type":"article","og_title":"Lab Policies - Information Technology","og_description":"Information Technology Policy and Procedures\u200b Acceptable Use Policy Acceptable Encryption Policy Data Center Access Policy Data Classification Policy Email Policy IT Audit Policy Lab Policies Leaving the University LAB POLICY Powered By EmbedPress","og_url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/","og_site_name":"Information Technology","article_modified_time":"2025-10-29T15:13:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/","url":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/","name":"Lab Policies - Information Technology","isPartOf":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/#website"},"datePublished":"2025-10-29T15:11:19+00:00","dateModified":"2025-10-29T15:13:02+00:00","breadcrumb":{"@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/lab-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nicholls.edu\/information-tech\/"},{"@type":"ListItem","position":2,"name":"IT Policy and Procedure","item":"https:\/\/www.nicholls.edu\/information-tech\/policyandprocedure\/"},{"@type":"ListItem","position":3,"name":"Lab Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.nicholls.edu\/information-tech\/#website","url":"https:\/\/www.nicholls.edu\/information-tech\/","name":"Information Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nicholls.edu\/information-tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Information Technology","distributor_original_site_url":"https:\/\/www.nicholls.edu\/information-tech","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/comments?post=881"}],"version-history":[{"count":0,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/881\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/pages\/460"}],"wp:attachment":[{"href":"https:\/\/www.nicholls.edu\/information-tech\/wp-json\/wp\/v2\/media?parent=881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}