{"id":549,"date":"2019-10-30T07:34:48","date_gmt":"2019-10-29T23:34:48","guid":{"rendered":"http:\/\/sites.gtiit.edu.cn\/it\/?page_id=549"},"modified":"2022-11-21T14:43:22","modified_gmt":"2022-11-21T06:43:22","slug":"cybersecurity-and-it-policies","status":"publish","type":"page","link":"https:\/\/sites.gtiit.edu.cn\/it\/home\/cybersecurity-and-it-policies\/","title":{"rendered":"Cybersecurity and IT Policies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"549\" class=\"elementor elementor-549\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8befa elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e8befa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62e4419\" data-id=\"62e4419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-146ff1a elementor-widget elementor-widget-heading\" data-id=\"146ff1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-large\">Cybersecurity and IT Policies<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26838e elementor-widget elementor-widget-text-editor\" data-id=\"f26838e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"text-align: left\">As a member of GTIIT, you have access to a wealth of security services and tools that will help you protect your computer, safeguard personal information, and secure sensitive University data. The Department of Information Technology proactively monitors our campus network and business systems to identify potential cybersecurity threats and quickly respond to cybersecurity issues. We offer a large variety of services, information, and tools to educate to the GTIIT community about cybersecurity, network account and system protection, or incident report. We are responsible for helping ensure the University\u2019s computing environment is protected from cyberthreats such as viruses, malware, phishing, hackers, and other security threats. To meet this goal, we have developed policies and instructions that guide everybody protecting computers as well as sensitive information from security threats. Also, we assist the University administration with adhering to local regulations and Technion policies regarding technology. For more information please refer to our<a href=\"https:\/\/sites.gtiit.edu.cn\/it\/home-2\/cybersecurity-and-it-policies\/it-policies-and-guidelines\/\"> IT Policies page<\/a>.<\/p><p style=\"text-align: left;padding-left: 30px\">\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95b260b elementor-widget elementor-widget-heading\" data-id=\"95b260b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-large\">Security Incident Response<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-295fd1d elementor-widget elementor-widget-text-editor\" data-id=\"295fd1d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>The National Multi-Level Protection Scheme(\u2018MLPS\u2019) is used to more effectively classify risk and set strategic security priorities at Guangdong Technion-Israel Institute of Technology. To help protect the University, we utilize a robust and layered array of centralized security measures. These measures include campus network firewalls, IT infrastructure monitoring, business application monitoring, proactive auditing, VPN solutions, security experts from Technion and local authorities, advanced detection and prevention tools, and more.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f8d398 elementor-widget elementor-widget-heading\" data-id=\"1f8d398\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-large\">IT Policy<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe42594 elementor-widget elementor-widget-text-editor\" data-id=\"fe42594\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<h5 style=\"text-align: left\"><span style=\"text-decoration: underline\"><span style=\"color: #ff9900\"><a style=\"color: #ff9900;text-decoration: underline\" href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/EaVr4r0bFQNJsJh-OyF_0VEB4OfmJdHouQMzhV8j2Gkgng?e=Jn6ooC\" target=\"_blank\" rel=\"noopener\">Code of Practice for the use of computing resources<\/a><\/span><\/span><\/h5><p style=\"text-align: left\">Any reference to computing resources, i.e. campus network or facilities applies, where appropriate, to those which are owned by GTIIT, or under its responsibility must comply with this policy. To be permitted to use GTIIT computing facilities, users are deemed to have read and be bound by this Code of Practice and GTIIT regulations.<\/p><h5 style=\"text-align: left\"><span style=\"text-decoration: underline\"><span style=\"color: #ff9900\"><a style=\"color: #ff9900;text-decoration: underline\" href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/EcNMmgI4O7pPvzFFqRqFUNMBW4wpNG-2DiHg9XSw4amiig?e=4t0zz3\" target=\"_blank\" rel=\"noopener\">User Acceptable Policy<\/a><\/span><\/span><\/h5><p style=\"text-align: left\"><span data-contrast=\"auto\">This document outlines the responsibilities of users of\u00a0<\/span><span data-contrast=\"auto\">Guangdong Technion-<\/span><span data-contrast=\"auto\">Israeli Institute of Technology (hereinafter GTIIT)\u00a0<\/span><span data-contrast=\"auto\">information resources, which are provided to the university community in support of the institutional mission.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><span data-contrast=\"auto\">The purpose of this document is to ensure\u00a0<\/span><span data-contrast=\"auto\">use of these resources complies<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">with\u00a0<\/span><span data-contrast=\"auto\">Technion global policies, and\u00a0<\/span><span data-contrast=\"auto\">applicable local requirements.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><span data-contrast=\"auto\">These directives apply to\u00a0<\/span><b><i><span data-contrast=\"auto\">all<\/span><\/i><\/b><span data-contrast=\"auto\">\u00a0users of\u00a0<\/span><span data-contrast=\"auto\">GTIIT<\/span><span data-contrast=\"auto\">\u00a0information resources.<\/span><\/p><h5><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/Ec9FlT77ELVClXFKDKIE1Q8B9BGAnsYiInnhUCRWnZnk2Q?e=c1E0gD\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline\"><span style=\"color: #ff9900;text-decoration: underline\">Computing Device Provisioning Policy<\/span><\/span><\/a><\/h5><p>GTIIT computing device is provided by the IT (Information Technology) Department which runs the University\u2019s computing hardware, software and technical support for the University\u2019s business. It is necessary to establish a reliable and supportable operating environment forcomputing deviceswhile also reducing risk to the comprehensive computing infrastructure.<\/p><p>The purpose of this policy is to outline the process by which GTIIT acquire all computing device. The goal of the policy is to ensure each GTIIT employee has adequate computing resources to perform their assigned responsibilities while also providing prudent stewardship of GTIIT resources.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737ca5e elementor-widget elementor-widget-heading\" data-id=\"737ca5e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-large\">Protecting your account<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59f3216 elementor-widget elementor-widget-text-editor\" data-id=\"59f3216\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"text-align: left\">Do not share your password with anyone, not even a member of staff. IT will never ask anyone to reveal a password and neither should any other GTIIT staff member. If you believe that your account has been compromised, change your password immediately.<\/p><ul><li><a href=\"http:\/\/sites.gtiit.edu.cn\/it\/home\/our-services\/connect_communicate\/it-account-password\/password\/\">About your password<\/a><\/li><li><a href=\"https:\/\/sites.gtiit.edu.cn\/it\/home\/cybersecurity-and-it-policies\/password\/\">Manage your password<\/a><\/li><\/ul><p style=\"padding-left: 30px\">\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9fdf80 elementor-widget elementor-widget-spacer\" data-id=\"b9fdf80\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and IT Policies As a member of GTIIT, you have access to a wealth of security services and tools that will help you protect your computer, safeguard personal information, and secure sensitive University data. The Department of Information Technology proactively monitors our campus network and business systems to identify potential cybersecurity threats and quickly [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":0,"parent":412,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/549"}],"collection":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/comments?post=549"}],"version-history":[{"count":3,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/549\/revisions"}],"predecessor-version":[{"id":5305,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/549\/revisions\/5305"}],"up":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/412"}],"wp:attachment":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/media?parent=549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}