Search15 Results

FAQs
Information of email encryption and a method of how you can encrypt a file sent through an email.
What constitutes a security violation at Clackamas Community College?
The purpose of the Clackamas Community College (CCC) Acceptable Use Policy (AUP) is to establish acceptable practices regarding the use of CCC Technological Resources.
The purpose of the Clackamas Community College (CCC) Acceptable Use Policy (AUP) is to establish acceptable practices regarding the use of CCC Technological Resources.
Terms and definitions of words and acronyms used in the CCC security policy
CCC shall operate an (ITS) Change Review Board (CRB) and enact an Information Technology Services Change Management Process (CMP).
This policy shall be subject to and superseded by applicable regulations and laws.
Security Policy Complaint procedures
CCC engages with individuals and organizations in many varied capacities. These complex relationships can result in difficulty in accurately categorizing individuals. This document’s intent is to provide a standard list of terms that will be used throughout the ITS Security Policy documents and to avoid potential issues that could potentially arise due to the inconsistent use of the various terms.
CCC Users and Systems that interact with payment card data are required to do so in compliance with PCI-DSS standards.
FAQs for people who have been forcibly removed from the CCC network
Clackamas Community College (CCC) instructors, for the purposes of teaching network, information security, software development, and other Information Technology Services curriculum may utilize a teaching environment known as a Sandbox Environment.

This policy shall be subject to and superseded by applicable regulations and laws.
The CIO shall implement a risk management program which shall reduce the information security risk exposure to a threshold acceptable to the CCC Executive Team. The risk management program shall comply with all applicable laws and regulations imposed upon CCC.
CCC’s Defense in Depth strategy seeks to prevent the intrusion and activation of malicious software, commonly referred to as “malware”. There are various types of malware and prevention may require different techniques and technologies. This policy seeks to protect the college, students, faculty, and staff from the adverse impact of malware infection.
Security Policy Governing standards, policies, and guidelines