Search15 Results
- Knowledge Base
- ITS
- Multi Factor Authentication
FAQs
- Knowledge Base
- ITS
- Email
Information of email encryption and a method of how you can encrypt a file sent through an email.
- Knowledge Base
- ITS
- ITS Security Policy
What constitutes a security violation at Clackamas Community College?
- Knowledge Base
- ITS
- ITS Security Policy
The purpose of the Clackamas Community College (CCC) Acceptable Use Policy (AUP) is to establish acceptable practices regarding the use of CCC Technological Resources.
- Knowledge Base
- ITS
- ITS Security Policy
The purpose of the Clackamas Community College (CCC) Acceptable Use Policy (AUP) is to establish acceptable practices regarding the use of CCC Technological Resources.
- Knowledge Base
- ITS
- ITS Security Policy
Terms and definitions of words and acronyms used in the CCC security policy
- Knowledge Base
- ITS
- ITS Security Policy
CCC shall operate an (ITS) Change Review Board (CRB) and enact an Information Technology Services Change Management Process (CMP).
This policy shall be subject to and superseded by applicable regulations and laws.
- Knowledge Base
- ITS
- ITS Security Policy
Security Policy Complaint procedures
- Knowledge Base
- ITS
- ITS Security Policy
CCC engages with individuals and organizations in many varied capacities. These complex relationships can result in difficulty in accurately categorizing individuals. This document’s intent is to provide a standard list of terms that will be used throughout the ITS Security Policy documents and to avoid potential issues that could potentially arise due to the inconsistent use of the various terms.
- Knowledge Base
- ITS
- ITS Security Policy
CCC Users and Systems that interact with payment card data are required to do so in compliance with PCI-DSS standards.
- Knowledge Base
- ITS
- Network
FAQs for people who have been forcibly removed from the CCC network
- Knowledge Base
- ITS
- ITS Security Policy
Clackamas Community College (CCC) instructors, for the purposes of teaching network, information security, software development, and other Information Technology Services curriculum may utilize a teaching environment known as a Sandbox Environment.
This policy shall be subject to and superseded by applicable regulations and laws.
- Knowledge Base
- ITS
- ITS Security Policy
The CIO shall implement a risk management program which shall reduce the information security risk exposure to a threshold acceptable to the CCC Executive Team. The risk management program shall comply with all applicable laws and regulations imposed upon CCC.
- Knowledge Base
- ITS
- ITS Security Policy
CCC’s Defense in Depth strategy seeks to prevent the intrusion and activation of malicious software, commonly referred to as “malware”. There are various types of malware and prevention may require different techniques and technologies. This policy seeks to protect the college, students, faculty, and staff from the adverse impact of malware infection.
- Knowledge Base
- ITS
- ITS Security Policy
Security Policy Governing standards, policies, and guidelines