{"id":15684,"date":"2025-10-07T12:19:11","date_gmt":"2025-10-07T16:19:11","guid":{"rendered":"https:\/\/www.qc.cuny.edu\/its\/?page_id=15684"},"modified":"2025-10-07T12:21:13","modified_gmt":"2025-10-07T16:21:13","slug":"information-security-policies","status":"publish","type":"page","link":"https:\/\/www.qc.cuny.edu\/its\/information-security-policies\/","title":{"rendered":"Information Security Policies"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;#E71939&#8243; custom_margin=&#8221;0px|||0px|false|false&#8221; custom_padding=&#8221;4px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Information Security Policies<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;60px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dsm_text_divider header=&#8221;Policies&#8221; text_alignment=&#8221;left&#8221; color=&#8221;#e71939&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;&#8211;et_global_body_font|500|||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#e71939&#8243; global_colors_info=&#8221;{}&#8221;][\/dsm_text_divider][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;129.2px&#8221; custom_padding=&#8221;9px||10px|||&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; min_height=&#8221;92.2px&#8221; global_colors_info=&#8221;{}&#8221;]Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;147.1px&#8221; custom_margin=&#8221;|auto|12px|auto||&#8221; custom_padding=&#8221;7px||7px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Acceptable-Use-of-Information-Technology-Resources-Policy.pdf\">Acceptable Use of Computing Resources<\/a><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Access-Control-Policy-v2.pdf\"><\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Account-Management-Access-Control-Standard.pdf\">Account Management Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Authentication-Tokens-Standard-v2.pdf\">Authentication Tokens Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Auditing-and-Accounting-Policy-v2.pdf\">Auditing &amp; Accounting Policy<\/a><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Access-Control-Policy-v2.pdf\"><\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Computer-Security-Threat-Response-Policy-v2.pdf\">Computer Security Threat Response Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Configuration-Management-Policy-V2.pdf\">Configuration Management Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Cyber-Incident-Response-Standard.pdf\">Cyber Incident Response Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Encryption-Standard.pdf\">Encryption Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Identification-and-Authentication-Policy-v2.pdf\">Identification and Authentication Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Information-Classification-Standard.pdf\">Information Classification Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Information-Security-Exception-Policy.pdf\">Information Security Exception<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Information-Security-Policy.pdf\">Information Security Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Information-Security-Risk-Management-Standard.pdf\">Information Security Risk Management<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Access-Control-Policy-v2.pdf\">Information Technology Access Control<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Maintenance-Policy-v2.pdf\">Maintenance Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Media-Protection-Policy-V2.pdf\">Media Protection Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Mobile-Device-Security-v2.pdf\">Mobile Device Security<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Patch-Management-Standard.pdf\">Patch Management Standard<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Patch-Management-Standard.pdf\"><\/a><\/p>\n<ul>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Personnel-Security-Policy-v2.pdf\">Personnel Security Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Physical-and-Environmental-Protection-Policy-v2.pdf\">Physical &amp; Environmental Protection Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Planning-Policy-V2.pdf\">Planning Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Policy-Numbering.pdf\">Policy Numbering<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Remote-Access-Standard.pdf\">Remote Access Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Risk-Assessment-Policy-v2.pdf\">Risk Assessment Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Sanitization-Secure-Disposal-Standard.pdf\">Sanitization Secure Disposal Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Secure-Configuration-Standard.pdf\">Secure Configuration Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Secure-System-Development-Life-Cycle-Standard-v2.pdf\">Secure System Disposal Standard<\/a><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Secure-Configuration-Standard.pdf\"><\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Security-Assesment-and-Authorization-Policy-v2.pdf\">Security Assessment &amp; Authorization Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Security-Awareness-And-Training-Policy.pdf\">Security Awareness &amp; Training Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Security-Logging-Standard.pdf\">Security Logging Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/System-and-Communications-Protection-Policy-v2.pdf\">System &amp; Communications Protection Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/System-and-Information-Integrity-Policy-v2.pdf\">System &amp; Information Integrity Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/System-And-Services-Acquisition-Policy-v2.pdf\">Systems &amp; Services Acquisition Policy<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/802.11-Wireless-Network-Security-Standard.pdf\">Wireless Network Security Standard<\/a><\/li>\n<li><a href=\"https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2025\/10\/Vulnerability-Scanning-Standard.pdf\">Vulnerability Scanning Standard<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Policies<div class=\"et_pb_module dsm_text_divider dsm_text_divider_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"dsm-text-divider-wrapper dsm-text-divider-align-left et_pb_bg_layout_light\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"dsm-text-divider-before dsm-divider\"><\/div>\n\t\t\t\t<h3 class=\"dsm-text-divider-header et_pb_module_header\"><span>Policies<\/span><\/h3>\n\t\t\t\t<div class=\"dsm-text-divider-after dsm-divider\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate [&hellip;]<\/p>\n","protected":false},"author":140,"featured_media":15591,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"page_category":[],"wf_page_folders":[76],"class_list":["post-15684","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages\/15684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/comments?post=15684"}],"version-history":[{"count":3,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages\/15684\/revisions"}],"predecessor-version":[{"id":15723,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages\/15684\/revisions\/15723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/media\/15591"}],"wp:attachment":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/media?parent=15684"}],"wp:term":[{"taxonomy":"page_category","embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/page_category?post=15684"},{"taxonomy":"wf_page_folders","embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/wf_page_folders?post=15684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}