{"id":1520,"date":"2024-07-24T19:40:13","date_gmt":"2024-07-24T19:40:13","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1520"},"modified":"2024-09-06T16:55:46","modified_gmt":"2024-09-06T16:55:46","slug":"program-management-pm","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/program-management-pm\/","title":{"rendered":"Program Management (PM)\u00a0"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">Program Management (PM)&nbsp;<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Purpose \u2013<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The Information Security Program Plan is a formal document that provides an overview of the security requirements for the Tarleton State University (Tarleton) information security program. This family of controls describes requirements related to the Information Security Program Plan.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Scope and Roles \u2013<\/strong>&nbsp;<\/h3>\n\n\n\n<p>This policy applies to information resources owned or managed by Tarleton. The intended audience includes the Tarleton Chief Information Officer (CIO), Chief Information Security Officer (CISO), and information resource owners and custodians.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Compliance \u2013<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The Information Security Program Plan and associated controls are implemented to ensure compliance with Title 1 Texas Administrative Code (TAC)&nbsp;<a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=70\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.70<\/a>,&nbsp;<a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=71\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.71<\/a>,&nbsp;<a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=72\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.72<\/a>,&nbsp;<a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=73\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.73<\/a>,&nbsp;<a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=74\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.74<\/a>, Texas Government Code (Tex Gov\u2019t Code)&nbsp;<a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/GV\/htm\/GV.2054.htm#2054.0591:~:text=Sec.%202054.133.%20%20INFORMATION%20SECURITY%20PLAN.\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a72054.133<\/a>, the Texas Department of Information Resources (DIR) Security Control Standards Catalog as required by TAC&nbsp;<a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=76\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.76<\/a>, and Texas A&amp;M University System (TAMUS)&nbsp;<a href=\"https:\/\/policies.tamus.edu\/29-01-03.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Regulation 29.01.03, Information Security.<\/a>&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Program Management (PM)&nbsp; Purpose \u2013&nbsp; The Information Security Program Plan is a formal document that provides an overview of the security requirements for the Tarleton State University (Tarleton) information security &#8230;<\/p>\n","protected":false},"author":94,"featured_media":580,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1520","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/jgeorge\/","display_name":"jgeorge"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 24, 2024","modified":"Updated on September 6, 2024"},"absolute_dates_time":{"created":"Posted on July 24, 2024 7:40 pm","modified":"Updated on September 6, 2024 4:55 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1520"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1520\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}