{"id":1524,"date":"2024-07-24T19:41:31","date_gmt":"2024-07-24T19:41:31","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1524"},"modified":"2024-09-05T16:21:41","modified_gmt":"2024-09-05T16:21:41","slug":"planning-pl","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/planning-pl\/","title":{"rendered":"Planning (PL)\u00a0"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">Planning (PL)&nbsp;<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Purpose &#8211;&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The Planning Policy and associated controls describe the requirements for documenting security and privacy plans and rules of behavior for information resource users.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Scope and Roles &#8211;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>This policy applies to information resources owned or managed by Tarleton. The intended audience includes the Tarleton Chief Information Officer (CIO), Chief Information Security Officer (CISO), and information resource owners and custodians.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Compliance &#8211;&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Security Planning controls are implemented to ensure compliance with Title 1 Texas Administrative Code (TAC) <a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=73\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.73(a)<\/a>, and Texas Government Code <a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/GV\/htm\/GV.2054.htm\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a72054.133<\/a>, the Texas Department of Information Resources (DIR) Security Control Standards Catalog as required by Title 1 Texas Administrative Code <a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=76\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a7202.76<\/a>, and Texas A&amp;M University System <a href=\"https:\/\/policies.tamus.edu\/29-01-03.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Regulation 29.01.03, Information Security<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Planning (PL)&nbsp; Purpose &#8211;&nbsp;&nbsp; The Planning Policy and associated controls describe the requirements for documenting security and privacy plans and rules of behavior for information resource users.&nbsp;&nbsp; Scope and Roles &#8230;<\/p>\n","protected":false},"author":94,"featured_media":580,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1524","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/jgeorge\/","display_name":"jgeorge"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 24, 2024","modified":"Updated on September 5, 2024"},"absolute_dates_time":{"created":"Posted on July 24, 2024 7:41 pm","modified":"Updated on September 5, 2024 4:21 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1524"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}