Search: Information Technology Services
Results
Phishing attempts come in many forms and are often made to look like requests from known vendors or associates. Most of these attempts have links that forward victims to nefarious websites in an effort to collect passwords and personal or confidential information; however, some may simply try to initiate a dialogue, which ultimately ends with them asking for unrecoverable items like gift cards or electronic transfers.
Protect your password
Administrative Procedure 3720 specifically prohibits the sharing of login credentials. Never provide your password to anyone: not your coworker, not your boss, not even ITS.
海角社区鈥檚 information technology resources are subject to the district鈥檚 Board Policies, Administrative Procedures, Information Security Standards, Best Practices, and IT Procedures as well as all applicable Federal, State, and local laws.
Information Standards, Best Practices, and Procedures build one upon the other to create an integrated approach to managing the requirements set forth in Board Policy and Administrative Procedures.
- California Community College Information Security Standard
- AP 5800 - Prevention of Identify Theft in Student Financial Transactions
- AP 5040 - Student Records, Directory Information, and Privacy
- AP 3725 - Accessibility of Information and Communication Technology (ICT)
- BP 3720 - Computer and Network User
- AP 3720 鈥 Computer and Network Use
- Read more
In accordance with Administrative Procedure 3720, all staff, faculty, and other individuals operating on behalf of the District (Personnel) who use District Information Resources shall be required to complete security awareness training.
Incident Reporting
Information Security Procedure
Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.
This ISPR directly supports the ITS Incident Response Information Security Standard.
The purpose of Long Beach Community College District鈥檚 Information Security Plan is to describe the development, implementation, and management of applicable administrative, physical, and technical controls to protect the institution鈥檚 data and information systems.
Goals
The Informational Technology Services (ITS) Information Security Plan contains the following goals:
Information security refers to the protection of information, information systems, equipment, software, and people from a wide spectrum of threats and risks. Implementing appropriate security measures and controls to provide for the confidentiality, integrity, and availability of information, regardless of its form (electronic, optical, oral, print, or other media), is critical to ensure business continuity, and protect information assets against unauthorized access, use, disclosure, disruption, modification, or destruction.