Search: 03/2020
Results
Phishing attempts come in many forms and are often made to look like requests from known vendors or associates. Most of these attempts have links that forward victims to nefarious websites in an effort to collect passwords and personal or confidential information; however, some may simply try to initiate a dialogue, which ultimately ends with them asking for unrecoverable items like gift cards or electronic transfers.
海角社区鈥檚 information technology resources are subject to the district鈥檚 Board Policies, Administrative Procedures, Information Security Standards, Best Practices, and IT Procedures as well as all applicable Federal, State, and local laws.
Information Standards, Best Practices, and Procedures build one upon the other to create an integrated approach to managing the requirements set forth in Board Policy and Administrative Procedures.
- California Community College Information Security Standard
- AP 5800 - Prevention of Identify Theft in Student Financial Transactions
- AP 5040 - Student Records, Directory Information, and Privacy
- AP 3725 - Accessibility of Information and Communication Technology (ICT)
- BP 3720 - Computer and Network User
- AP 3720 鈥 Computer and Network Use
- Read more
Enrollment Guides
- HOW TO Apply to LBCC?
- HOW TO Create your Viking Student Login
- HOW TO Complete the Online Orientation
- HOW TO Complete the Participation Agreement
- HOW TO Complete the Guided Placement Tool
- HOW TO Schedule a Welcome Center Counseling Appointment
- HOW TO Register for Classes
- HOW TO Purchase Textbooks
- HOW TO View Educational Plan (Degree Planner)
- HOW TO Add a Class with an Add Code
- HOW TO Access Canvas Course
- HOW TO Drop a Class from your Schedule
- HOW TO View Your Registration Appointment
- HOW TO View your Course Schedule
- Read more
In accordance with Administrative Procedure 3720, all staff, faculty, and other individuals operating on behalf of the District (Personnel) who use District Information Resources shall be required to complete security awareness training.
Managing Data, Files and Folders in OneDrive
Information Security Best Practice
Information Security Best Practices (ISBP) are developed in support of District Information Security Standards including the California Community College Information Security Standard.
Remediating PII in Outlook
Information Security Procedure
Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.
PII and Outlook
In today鈥檚 evolving threat landscape, we must protect ourselves from those that would perpetrate fraud against us by constantly questioning how we store and transmit confidential information.
Remediating PII in OneDrive
Information Security Procedure
Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.
This ISPR directly supports the ISBP for sharing files and folders in OneDrive.
PII and OneDrive
In today鈥檚 evolving threat landscape, we must protect ourselves from those who would perpetrate fraud against us by constantly questioning how we store and transmit confidential information.
Passphrases
Office of Information Security
Why Transition to a Passphrase?
Strong passwords are an essential aspect of account security. Unfortunately, complexity requirements often lead to confusing, hard to type, and hard to remember passwords, which in turn lead users to circumvent other, important controls. Industry leaders have analyzed 100鈥檚 of millions of accounts and concluded that the practices of the past (forcing complexity, password expiration, hints, questions, etc.) have led to bad user experience and, therefore, bad behavior.
Vendor Risk Management
Information Security Procedure
Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.
This ISPR directly supports the Vulnerability Management Information Security Standard.
This standard is divided into the following sections:
The purpose of Long Beach Community College District鈥檚 Information Security Plan is to describe the development, implementation, and management of applicable administrative, physical, and technical controls to protect the institution鈥檚 data and information systems.
Goals
The Informational Technology Services (ITS) Information Security Plan contains the following goals: