{"id":3410,"date":"2020-09-16T13:31:49","date_gmt":"2020-09-16T05:31:49","guid":{"rendered":"http:\/\/sites.gtiit.edu.cn\/it\/?page_id=3410"},"modified":"2022-11-11T08:59:33","modified_gmt":"2022-11-11T00:59:33","slug":"it-policies-and-guidelines","status":"publish","type":"page","link":"https:\/\/sites.gtiit.edu.cn\/it\/home\/cybersecurity-and-it-policies\/it-policies-and-guidelines\/","title":{"rendered":"IT Policies and Guidelines"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3410\" class=\"elementor elementor-3410\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8befa elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1e8befa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62e4419\" data-id=\"62e4419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c26cc7 elementor-widget elementor-widget-heading\" data-id=\"5c26cc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IT Policies and Guidelines<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26838e elementor-widget elementor-widget-text-editor\" data-id=\"f26838e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Policies define how IT Department will approach security, how employees (admin staff, faculty) and students are to approach security, and how certain situations will be handled.\u00a0This web page lists many university&#8217;s IT policies, it is not an exhaustive list. Laws, policies, and regulations not specific to information technology may also apply.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40076fc elementor-widget elementor-widget-heading\" data-id=\"40076fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Technion (Israel) IT Policies<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1ff787 elementor-widget elementor-widget-text-editor\" data-id=\"b1ff787\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Technion-Israel Institute of Technology, our parent university in Haifa, Israel, provides GTIIT students and eligible employees with Technion network accounts. A user who has such a credential is required to adhere to Technion policies. For details, please visit <a href=\"https:\/\/osh.net.technion.ac.il\/%d7%a0%d7%94%d7%9c%d7%99-%d7%94%d7%98%d7%9b%d7%a0%d7%99%d7%95%d7%9f-%d7%97%d7%93%d7%a9\/#ch9\">Technion Regulations<\/a> (Hebrew only)<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbecf6d elementor-widget elementor-widget-heading\" data-id=\"fbecf6d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">GTIIT IT Policies and Procedures<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9900c7 elementor-widget elementor-widget-text-editor\" data-id=\"e9900c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>The following documents are available upon request.<\/p><ul><li><a href=\"https:\/\/sites.gtiit.edu.cn\/it\/home-2\/cybersecurity-and-it-policies\/\">Cybersecurity and IT Policies<\/a><\/li><li><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/EaVr4r0bFQNJsJh-OyF_0VEB4OfmJdHouQMzhV8j2Gkgng?e=3hykSR\" target=\"_blank\" rel=\"noopener\">Code of Practice for the use of computing resources<\/a><\/li><li><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/EcNMmgI4O7pPvzFFqRqFUNMBW4wpNG-2DiHg9XSw4amiig?e=Huaj3e\" target=\"_blank\" rel=\"noopener\">User Acceptable Policy<\/a><\/li><li><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/Ec9FlT77ELVClXFKDKIE1Q8B9BGAnsYiInnhUCRWnZnk2Q?e=c1E0gD\" target=\"_blank\" rel=\"noopener\">Computing Device Provisioning Policy<\/a><\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-696e0b6 elementor-widget elementor-widget-heading\" data-id=\"696e0b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Laws<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85208a3 elementor-widget elementor-widget-text-editor\" data-id=\"85208a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ul><li><a href=\"http:\/\/www.cac.gov.cn\/2016-11\/07\/c_1119867116.htm\">China Cybersecurity Law<\/a><\/li><li><a href=\"http:\/\/www.cac.gov.cn\/2019-10\/27\/c_1573711980953641.htm\">China Password Law<\/a><\/li><li><a href=\"http:\/\/www.cac.gov.cn\/2004-08\/28\/c_126468489.htm\">China Digital Signature Law<\/a>\u00a0<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT Policies and Guidelines Policies define how IT Department will approach security, how employees (admin staff, faculty) and students are to approach security, and how certain situations will be handled.\u00a0This web page lists many university&#8217;s IT policies, it is not an exhaustive list. Laws, policies, and regulations not specific to information technology may also apply. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":549,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/3410"}],"collection":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/comments?post=3410"}],"version-history":[{"count":3,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/3410\/revisions"}],"predecessor-version":[{"id":5215,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/3410\/revisions\/5215"}],"up":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/549"}],"wp:attachment":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/media?parent=3410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}