{"id":1502,"date":"2024-07-24T18:19:47","date_gmt":"2024-07-24T18:19:47","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1502"},"modified":"2024-09-05T21:52:20","modified_gmt":"2024-09-05T21:52:20","slug":"pe-5-access-control-for-output-devices","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-5-access-control-for-output-devices\/","title":{"rendered":"PE-5: Access Control for Output Devices"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">PE-5: Access Control for Output Devices<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>NIST Baseline: &nbsp;<\/strong>Moderate&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Not Required by DIR or TAMUS (Discretionary)<\/strong>&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Review Date: &nbsp;<\/strong>07\/24\/2024&nbsp;<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Information resource custodians who are responsible for Tarleton State University (Tarleton) information resource facilities will ensure that physical access to facility output devices is controlled to prevent unauthorized individuals from obtaining inappropriate access to the output. &nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong>Note:<\/strong> Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and allowing access to authorized individuals only, placing output devices in locations that can be monitored by personnel, installing monitor or screen filters, and using headphones. Examples of output devices include monitors, printers, scanners, audio devices, facsimile machines, and copiers.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>References\/Additional Resources<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/doi.org\/10.6028\/NIST.IR.8023\" target=\"_blank\" rel=\"noreferrer noopener\">IR 8023<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PE-5: Access Control for Output Devices NIST Baseline: &nbsp;Moderate&nbsp; Not Required by DIR or TAMUS (Discretionary)&nbsp; Review Date: &nbsp;07\/24\/2024&nbsp; Note: Controlling physical access to output devices includes placing output devices &#8230;<\/p>\n","protected":false},"author":1,"featured_media":580,"parent":1528,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1502","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/brian-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"brian"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 24, 2024","modified":"Updated on September 5, 2024"},"absolute_dates_time":{"created":"Posted on July 24, 2024 6:19 pm","modified":"Updated on September 5, 2024 9:52 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1502"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1502\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}