{"id":796,"date":"2022-06-08T14:44:47","date_gmt":"2022-06-08T14:44:47","guid":{"rendered":"https:\/\/web.tarleton.edu\/technology\/?page_id=796"},"modified":"2025-07-01T14:21:21","modified_gmt":"2025-07-01T14:21:21","slug":"informationsecurity","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/technology\/informationsecurity\/","title":{"rendered":"Information Security"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Information Security<\/h1>\n\n\n\n<div class=\"wp-block-advgb-columns advgb-columns-wrapper\" id=\"advgb-cols-b69f3c42-54ce-44b6-b1b4-a14e9fcd39e6\"><div class=\"advgb-columns-container\"><div class=\"advgb-columns advgb-columns-row advgb-is-mobile advgb-columns-2 layout-13-23 mbl-layout-stacked gutter-30 vgutter-10\">\n<div class=\"wp-block-advgb-column advgb-column advgb-is-one-third-tablet advgb-is-full-mobile\" id=\"advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<figure class=\"wp-block-image size-large is-resized better-border\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/information-security-1024x683.jpg\" alt=\"Cursor pointing to the word &quot;Security&quot; on a screen.\" class=\"wp-image-795\" style=\"width:402px;height:268px\" srcset=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/information-security-1024x683.jpg 1024w, https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/information-security-300x200.jpg 300w, https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/information-security-600x400.jpg 600w, https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/information-security-768x512.jpg 768w, https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/information-security.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-column advgb-column advgb-is-two-thirds-tablet advgb-is-full-mobile\" id=\"advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<p>I.T.S. Security supports Tarleton\u2019s mission by overseeing the University\u2019s efforts to protect information and information systems with a goal to assure the availability, integrity, and confidentiality of the University\u2019s electronic information. To achieve this goal the ISO develops policies and procedures and raises security awareness within the campus community.<\/p>\n\n\n\n<p>The Information Security Office ensures that the University is in compliance with Texas Administrative Code Chapter 202, as well as other State and Federal laws dealing with Information Security.<\/p>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-it-standards-for-all\/\">Tarleton IT Standards for All Users<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/policy\/wp-content\/uploads\/sites\/142\/2022\/06\/29_01_03_T0_01.pdf\">Tarleton Information Resources &#8211; Acceptable Use Policy<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/iops\/\">Tarleton Information Technology Security Standards<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/policy\/\">Tarleton State University Rules and Standard Administrative Procedures<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/\" data-type=\"URL\" data-id=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/Tarleton-Security-Control-Standards-Catalog.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Tarleton Security Control Standards Catalog<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.ViewTAC?tac_view=4&amp;ti=1&amp;pt=10&amp;ch=202\">Texas Administrative Code \u2013 Chapter 202<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/gdpr\/\">General Data Protection Regulation<\/a><\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Information Security Tips and Best Practices<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/tech-tips\/\">Technology Tips and Security Information<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/tech-spot\/phishing-2\/#recent-scams\">Phishing Scams<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/tech-spot\/smartphone\/\">Smartphones and Security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/tech-spot\/sharing\/\">Peer-to-Peer File Sharing<\/a><\/p>\n\n\n\n<p>To report an information security incident, please send an email to&nbsp;<a href=\"mailto:ITSecurity@tarleton.edu\">ITSecurity@tarleton.edu<\/a>&nbsp;or contact the Information Security Officer at <a href=\"tel:+12549689160\">(254) 968-9160<\/a>.<\/p>\n<style class=\"advgb-styles-renderer\">#advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5>.advgb-column-inner{}}#advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5>.advgb-column-inner{}}#advgb-cols-b69f3c42-54ce-44b6-b1b4-a14e9fcd39e6{}@media screen and (max-width: 1023px) {#advgb-cols-b69f3c42-54ce-44b6-b1b4-a14e9fcd39e6{}}@media screen and (max-width: 767px) {#advgb-cols-b69f3c42-54ce-44b6-b1b4-a14e9fcd39e6{}}#advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-448d4c58-4957-4e7d-b720-0120f51850e5>.advgb-column-inner{}}#advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-de0af4d2-0a86-4826-9cea-8dd3579b9ec5>.advgb-column-inner{}}<\/style>","protected":false},"excerpt":{"rendered":"<p>Information Security Compliance Tarleton IT Standards for All Users Tarleton Information Resources &#8211; Acceptable Use Policy Tarleton Information Technology Security Standards Tarleton State University Rules and Standard Administrative Procedures Tarleton &#8230;<\/p>\n","protected":false},"author":62,"featured_media":580,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-796","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/technology\/author\/kyle-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"kyle"},"relative_dates":{"created":"Posted 4 years ago","modified":"Updated 10 months ago"},"absolute_dates":{"created":"Posted on June 8, 2022","modified":"Updated on July 1, 2025"},"absolute_dates_time":{"created":"Posted on June 8, 2022 2:44 pm","modified":"Updated on July 1, 2025 2:21 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/comments?post=796"}],"version-history":[{"count":4,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/796\/revisions"}],"predecessor-version":[{"id":2582,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/796\/revisions\/2582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/media?parent=796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}