{"id":938,"date":"2014-08-14T10:46:59","date_gmt":"2014-08-14T14:46:59","guid":{"rendered":"https:\/\/huangshizhaopin.com\/its\/?page_id=938"},"modified":"2014-08-14T10:47:36","modified_gmt":"2014-08-14T14:47:36","slug":"network-policy","status":"publish","type":"page","link":"https:\/\/huangshizhaopin.com\/its\/policies\/network-policy\/","title":{"rendered":"Network Policy"},"content":{"rendered":"
1. Network login ID password resets will be forced every 180 days<\/strong> to comply with security standards and recommendations.<\/p>\n 2. Faculty, staff or students, who leave the college for any reason, will not retain network access for any period of time unless approval is received from the individual\u2019s department head. These requests should be sent to the CIO. 1. The Personnel Action Form (PAF)<\/strong> and Exit Interview Form will be used as an ITS notification step when an employee is hired or terminated.<\/p>\n","protected":false},"excerpt":{"rendered":" 1. Network login ID password resets will be forced every 180 days to comply with security standards and recommendations. If a computer is inactive for \u00bd hour, user will be required to login again. After logging into the computer, the user will be required to confirm that they have read and will comply with the […]<\/p>\n","protected":false},"author":12,"featured_media":0,"parent":234,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-938","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/comments?post=938"}],"version-history":[{"count":2,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/938\/revisions"}],"predecessor-version":[{"id":940,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/938\/revisions\/940"}],"up":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/pages\/234"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/its\/wp-json\/wp\/v2\/media?parent=938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
\n3. Virtual Private Network (VPN)<\/strong> access to the network will be granted on an individual basis based on the request by the individual\u2019s department head to the CIO.
\n4. Additional policies pertaining to the network may be found under Acceptable Use Policy<\/a>, Copyright Policy<\/a>, and Email Policy<\/a>.<\/p>\nOther ITS Policies<\/h3>\n