Search15 Results

Start typing to lookup. Use the UP and DOWN arrow keys to review results. Press ENTER to select. Press BACKSPACE to remove a selection.
    Lookup Category Clear Category
    This policy establishes a Change Review Board (CRB) and a Change Management Process (CMP) to ensure that all modifications to Clackamas Community College's production environment are reviewed, assessed for risks, and properly authorized before implementation. It outlines procedures for approval, back-out planning, and security validation while requiring CIO approval for any exceptions.
    This policy defines key security policies and terminology governing the acceptable use, management, and protection of technological resources at Clackamas Community College (CCC). It ensures compliance with legal, regulatory, and institutional requirements while supporting a secure and efficient technology environment.
    Policy 002 defines the overarching scope of Clackamas Community College’s cybersecurity policies, applying to all users, systems, and data unless otherwise specified. All related terminology and definitions have been consolidated into Policy 005 for consistency and ease of reference.
    This policy outlines the requirements for acceptable use of Clackamas Community College’s electronic information resources, specifying compliance expectations, enforcement authority, potential violations, and consequences for non-compliance. It also clarifies that failure to enforce a policy does not waive future violations.
    This policy outlines the procedures for reporting security and non-security violations at Clackamas Community College and emphasizes compliance with federal regulations, including HIPAA, GLBA, FERPA, and PCI-DSS. It also highlights the importance of safeguarding sensitive information and the consequences of non-compliance.
    This policy establishes guidelines for the responsible and secure use of Clackamas Community College’s Electronic Information Resources by students. It defines expectations, restrictions, and potential consequences for misuse to ensure a safe, lawful, and productive academic environment.
    This policy outlines guidelines for the responsible use of CCC Technological Resources, ensuring compliance with laws, protecting sensitive data, and maintaining resource security and accessibility. It applies to all staff and provides detailed regulations on general use, accounts, computing devices, network access, electronic communications, and data management, with violations subject to disciplinary action.
    Policy 117 establishes guidelines for Sandbox Environments at Clackamas Community College, allowing faculty to create isolated teaching environments for IT-related instruction while ensuring security controls and compliance with regulations. These environments are restricted to approved users, subject to audits, and exempt from broader security policies, with exceptions requiring CIO approval.
    This policy establishes a structured framework for managing information security risks at Clackamas Community College, ensuring compliance with laws, adherence to industry best practices, and alignment with the institution's mission. The CIO is responsible for implementing a risk management program that mitigates threats, supports disaster recovery, and maintains acceptable risk tolerance levels.
    Policy 107 establishes Clackamas Community College’s anti-malware strategy, ensuring all ITS resources are protected by approved software, regularly updated, and centrally managed. It mandates real-time alerts, log retention, and strict access controls to mitigate malware threats effectively.
    This security policy outlines the key regulatory and compliance standards governing data protection, privacy, and cybersecurity. It provides references to federal, state, and industry regulations to ensure institutional compliance and safeguard sensitive information.
    This policy ensures Clackamas Community College complies with PCI-DSS standards by securing payment card data, restricting access, prohibiting data storage, enforcing employee training, and monitoring networks for vulnerabilities. It mandates strict security controls, with exceptions requiring CIO approval.
    Information of email encryption and a method of how you can encrypt a file sent through an email.
    FAQs
    FAQs for people who have been forcibly removed from the CCC network