{"id":3410,"date":"2020-09-16T13:31:49","date_gmt":"2020-09-16T05:31:49","guid":{"rendered":"http:\/\/sites.gtiit.edu.cn\/it\/?page_id=3410"},"modified":"2022-11-11T08:59:33","modified_gmt":"2022-11-11T00:59:33","slug":"it-policies-and-guidelines","status":"publish","type":"page","link":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/home\/cybersecurity-and-it-policies\/it-policies-and-guidelines\/","title":{"rendered":"\u6559\u80b2\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6\u4e0e\u76f8\u5173\u6cd5\u89c4"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3410\" class=\"elementor elementor-3410\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8befa elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1e8befa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62e4419\" data-id=\"62e4419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c26cc7 elementor-widget elementor-widget-heading\" data-id=\"5c26cc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u6559\u80b2\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6\u4e0e\u76f8\u5173\u6cd5\u89c4<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26838e elementor-widget elementor-widget-text-editor\" data-id=\"f26838e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u6559\u80b2\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6\u662f\u4f7f\u7528\u6211\u6821\u4fe1\u606f\u5316\u8d44\u6e90\u7684\u6240\u6709\u7528\u6237\u5fc5\u987b\u9075\u5faa\u7684\u51c6\u5219\u3002\u4e0b\u9762\u5217\u51fa\u4e86Technion\u548cGTIIT\u7684\u4fe1\u606f\u6280\u672f\u7ba1\u7406\u6cd5\u89c4\u4e0e\u5236\u5ea6\u3002<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40076fc elementor-widget elementor-widget-heading\" data-id=\"40076fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\uff08Technion\uff09\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1ff787 elementor-widget elementor-widget-text-editor\" data-id=\"b1ff787\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\uff08Technion-Israel Institute of Technology\uff09\u4f4d\u4e8e\u4ee5\u8272\u5217\u7684\u6d77\u6cd5\u5e02\uff0c\u4e3a\u6211\u6821\u5b66\u751f\u548c\u90e8\u5206\u5458\u5de5\u63d0\u4f9bTechnion\u7f51\u7edc\u8d26\u53f7\u3002\u62e5\u6709Technion\u8d26\u53f7\u7684\u7528\u6237\u5fc5\u987b\u9075\u5b88\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\u7684\u76f8\u5173\u6cd5\u89c4\u3002\u8be6\u60c5\u8bf7\u6d4f\u89c8\u7f51\u9875 <a href=\"https:\/\/osh.net.technion.ac.il\/%d7%a0%d7%94%d7%9c%d7%99-%d7%94%d7%98%d7%9b%d7%a0%d7%99%d7%95%d7%9f-%d7%97%d7%93%d7%a9\/#ch9\">\u201c\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\u7684\u89c4\u7ae0\u5236\u5ea6\u201d<\/a> \uff08\u4ec5\u5e0c\u4f2f\u6765\u8bed\uff09\u3002<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbecf6d elementor-widget elementor-widget-heading\" data-id=\"fbecf6d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">\u5e7f\u4e1c\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\uff08GTIIT\uff09\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9900c7 elementor-widget elementor-widget-text-editor\" data-id=\"e9900c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>\u5e7f\u4e1c\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\uff08GTIIT\uff09\u6821\u56ed\u7f51\u7edc\u7528\u6237\u9700\u9075\u5faa\u4ee5\u4e0b\u4fe1\u606f\u5316\u89c4\u7ae0\u5236\u5ea6\uff1a<\/p><ul><li><a href=\"https:\/\/sites.gtiit.edu.cn\/it\/home-2\/cybersecurity-and-it-policies\/\">\u7f51\u7edc\u5b89\u5168\u548c\u4fe1\u606f\u5316\u7ba1\u7406\u5236\u5ea6<\/a><\/li><li><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/EaVr4r0bFQNJsJh-OyF_0VEB4OfmJdHouQMzhV8j2Gkgng?e=3hykSR\" target=\"_blank\" rel=\"noopener\">\u5e7f\u4e1c\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\u4fe1\u606f\u5316\u8d44\u6e90\u7528\u6237\u5b88\u5219<\/a><\/li><li><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/EcNMmgI4O7pPvzFFqRqFUNMBW4wpNG-2DiHg9XSw4amiig?e=Huaj3e\" target=\"_blank\" rel=\"noopener\">\u5e7f\u4e1c\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\u4fe1\u606f\u5316\u8d44\u6e90\u7528\u6237\u7684\u8d23\u4efb\u4e0e\u4e49\u52a1<\/a><\/li><li><a href=\"https:\/\/technionchina.sharepoint.com\/:b:\/s\/Files\/Ec9FlT77ELVClXFKDKIE1Q8B9BGAnsYiInnhUCRWnZnk2Q?e=c1E0gD\" target=\"_blank\" rel=\"noopener\">\u5e7f\u4e1c\u4ee5\u8272\u5217\u7406\u5de5\u5b66\u9662\u4fe1\u606f\u5316\u8bbe\u5907\u8d2d\u7f6e\u5206\u914d\u7ba1\u7406\u5236\u5ea6<\/a><\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-696e0b6 elementor-widget elementor-widget-heading\" data-id=\"696e0b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">\u4fe1\u606f\u5316\u76f8\u5173\u6cd5\u5f8b\u6cd5\u89c4<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85208a3 elementor-widget elementor-widget-text-editor\" data-id=\"85208a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ul><li><a href=\"http:\/\/www.cac.gov.cn\/2016-11\/07\/c_1119867116.htm\">\u4e2d\u56fd\u7f51\u7edc\u5b89\u5168\u6cd5\u5f8b<\/a><\/li><li><a href=\"http:\/\/www.cac.gov.cn\/2019-10\/27\/c_1573711980953641.htm\">\u4e2d\u56fd\u5bc6\u7801\u6cd5<\/a><\/li><li><a href=\"http:\/\/www.cac.gov.cn\/2004-08\/28\/c_126468489.htm\">\u4e2d\u56fd\u6570\u5b57\u7b7e\u540d\u6cd5<\/a>\u00a0<\/li><\/ul>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>IT Policies and Guidelines Policies define how IT Department will approach security, how employees (admin staff, faculty) and students are to approach security, and how certain situations will be handled.\u00a0This web page lists many university&#8217;s IT policies, it is not an exhaustive list. Laws, policies, and regulations not specific to information technology may also apply. [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":549,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/3410"}],"collection":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/comments?post=3410"}],"version-history":[{"count":3,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/3410\/revisions"}],"predecessor-version":[{"id":5215,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/3410\/revisions\/5215"}],"up":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/pages\/549"}],"wp:attachment":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/zh\/wp-json\/wp\/v2\/media?parent=3410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}