{"id":812,"date":"2022-06-08T14:56:03","date_gmt":"2022-06-08T14:56:03","guid":{"rendered":"https:\/\/web.tarleton.edu\/technology\/?page_id=812"},"modified":"2026-04-09T19:15:26","modified_gmt":"2026-04-09T19:15:26","slug":"iops","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/technology\/iops\/","title":{"rendered":"Information Security Standards"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Information Technology Security Standards<\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-account-management-standard\/\">Account Management<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-admin-special-access-standard\/\">Administrator or Special Access<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-backup-recovery-standard\/\">Backup Recovery<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-electronic-information-resource-complaints-standard\/\">Electronic Information Resource Complaints<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-email-use-standard\/\">Email Use<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-incidental-computer-use-standard\/\">Incidental Computer Use<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-internet-of-things-iot-standard\/\">Internet of Things (IoT)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-intrusion-detection-standard\/\">Intrusion Detection<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-malicious-code-standard\/\">Malicious Code<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-network-configuration-standard\/\">Network Configuration<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-network-wireless-access-standard\/\">Network\/Wireless Access<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-password-authentication-standard\/\">Password Authentication<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-physical-access-standard\/\">Physical Access<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-portable-computing-standard\/\">Portable Computing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2023\/06\/printers-standard.docx\">Printers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/privacy-standard.pdf\">Privacy<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/security-awr-training-standard.pdf\">Security Awareness Training<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/security-monitoring-standard.pdf\">Security Monitoring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/security-resources-standard.pdf\">Security of Electronic Resources<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/server-hardening-standard_cqwmn.pdf\">Server Hardening<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/use-peer-software-standard.pdf\">Use of Peer-to-Peer Sharing Software<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/vendor-access-standard.pdf\">Vendor Access<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/web-accessibility-standard.pdf\">Web Accessibility<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Information Technology Security Standards<\/p>\n","protected":false},"author":62,"featured_media":580,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-812","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/technology\/author\/kyle-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"kyle"},"relative_dates":{"created":"Posted 4 years ago","modified":"Updated 2 weeks ago"},"absolute_dates":{"created":"Posted on June 8, 2022","modified":"Updated on April 9, 2026"},"absolute_dates_time":{"created":"Posted on June 8, 2022 2:56 pm","modified":"Updated on April 9, 2026 7:15 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/comments?post=812"}],"version-history":[{"count":15,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/812\/revisions"}],"predecessor-version":[{"id":3134,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/812\/revisions\/3134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/media?parent=812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}