Search: 2020

Results 1 - 10 of 584

Results

Phishing attempts come in many forms and are often made to look like requests from known vendors or associates. Most of these attempts have links that forward victims to nefarious websites in an effort to collect passwords and personal or confidential information; however, some may simply try to initiate a dialogue, which ultimately ends with them asking for unrecoverable items like gift cards or electronic transfers.

海角社区鈥檚 information technology resources are subject to the district鈥檚 Board Policies, Administrative Procedures, Information Security Standards, Best Practices, and IT Procedures as well as all applicable Federal, State, and local laws.

Information Standards, Best Practices, and Procedures build one upon the other to create an integrated approach to managing the requirements set forth in Board Policy and Administrative Procedures.

Post

3000
Personnel

Contact LAC, A-1153

海角社区Completions

(562) 938-5180

Hours

Mon
8:00 AM - 5:00 PM
Tue
8:00 AM - 5:00 PM
Wed
8:00 AM - 5:00 PM
Thu
8:00 AM - 5:00 PM
Fri
8:00 AM - 12:00 PM
Sat
Closed
Sun
Closed
Pod

Resources for Program Planning/Review

The following documents are resources to support your program faculty in completing the annual program plan/review template.

Please contact Samira Habash (Department Plan/Program Review Subcommittee Chair) or Jennifer Holmgren (Director of Planning) if you have any questions about program planning and review.

Resource Request Guidance - This document provides clarification on what resources should and should not be included in your program plan/review resource request list.