{"id":3581,"date":"2014-02-03T10:19:40","date_gmt":"2014-02-03T14:19:40","guid":{"rendered":"https:\/\/www.umw.edu\/policies\/?p=3581"},"modified":"2014-02-03T10:19:40","modified_gmt":"2014-02-03T14:19:40","slug":"revised-information-technology-policies-2","status":"publish","type":"post","link":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/","title":{"rendered":"Revised Information Technology Policies"},"content":{"rendered":"<p>The following Information Technology policies were revised to\u00a0remove &#8220;Name&#8221; and &#8220;Date of Birth&#8221; from being classified as highly sensitive information:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.boarddocs.com\/va\/umw\/Board.nsf\/goto?open&amp;id=8Q9TB97689BB\" target=\"_blank\">E.4.1. Administrative Data Access<\/a><\/li>\n<li><a href=\"https:\/\/www.boarddocs.com\/va\/umw\/Board.nsf\/goto?open&amp;id=8Q9TS778BAA0\" target=\"_blank\">E.4.5. Electronic Storage of Highly Sensitive Data<\/a><\/li>\n<li><a href=\"https:\/\/www.boarddocs.com\/va\/umw\/Board.nsf\/goto?open&amp;id=8Q9TQA7872D7\" target=\"_blank\">E.4.6. Data Classification<\/a><\/li>\n<li><a href=\"https:\/\/www.boarddocs.com\/va\/umw\/Board.nsf\/goto?open&amp;id=8Q9THV778245\" target=\"_blank\">E.4.7. Data Encryption<\/a><\/li>\n<\/ul>\n<p>You will find the policies in Book E, Administration and Finance, under Section 4, Information Technology. Click the policies listed above to view each one in BoardDocs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following Information Technology policies were revised to\u00a0remove &#8220;Name&#8221; and &#8220;Date of Birth&#8221; from being classified as highly sensitive information: E.4.1. Administrative Data Access E.4.5. Electronic Storage of Highly Sensitive Data E.4.6. Data Classification E.4.7. Data Encryption You will find the policies in Book E, Administration and Finance, under Section 4, Information Technology. Click the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"umw_cb_additional_links":[[]],"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_advisory_expires_time":"","_advisory_meta_include":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[3],"tags":[],"class_list":{"0":"post-3581","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-policy-news","7":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Revised Information Technology Policies - University Policies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Revised Information Technology Policies\" \/>\n<meta property=\"og:description\" content=\"The following Information Technology policies were revised to\u00a0remove &#8220;Name&#8221; and &#8220;Date of Birth&#8221; from being classified as highly sensitive information: E.4.1. Administrative Data Access E.4.5. Electronic Storage of Highly Sensitive Data E.4.6. Data Classification E.4.7. Data Encryption You will find the policies in Book E, Administration and Finance, under Section 4, Information Technology. Click the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/\" \/>\n<meta property=\"og:site_name\" content=\"University Policies\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-03T14:19:40+00:00\" \/>\n<meta name=\"author\" content=\"UMW\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UMW\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/\"},\"author\":{\"name\":\"UMW\",\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/#\\\/schema\\\/person\\\/6be9e9198e9ea0116a675df5ae87ccc1\"},\"headline\":\"Revised Information Technology Policies\",\"datePublished\":\"2014-02-03T14:19:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/\"},\"wordCount\":68,\"articleSection\":[\"Policy News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/\",\"url\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/\",\"name\":\"Revised Information Technology Policies - University Policies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/#website\"},\"datePublished\":\"2014-02-03T14:19:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/#\\\/schema\\\/person\\\/6be9e9198e9ea0116a675df5ae87ccc1\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/2014\\\/02\\\/03\\\/revised-information-technology-policies-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Revised Information Technology Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/#website\",\"url\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/\",\"name\":\"University Policies\",\"description\":\"University of Mary Washington\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/#\\\/schema\\\/person\\\/6be9e9198e9ea0116a675df5ae87ccc1\",\"name\":\"UMW\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58b3ffd0b73294f863ad96fae57fa25580dcc3be1411bfc5177ea9fbd3615272?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58b3ffd0b73294f863ad96fae57fa25580dcc3be1411bfc5177ea9fbd3615272?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58b3ffd0b73294f863ad96fae57fa25580dcc3be1411bfc5177ea9fbd3615272?s=96&d=mm&r=g\",\"caption\":\"UMW\"},\"sameAs\":[\"https:\\\/\\\/www.umw.edu\"],\"url\":\"https:\\\/\\\/www.umw.edu\\\/policies\\\/author\\\/umwwebmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Revised Information Technology Policies - University Policies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/","og_locale":"en_US","og_type":"article","og_title":"Revised Information Technology Policies","og_description":"The following Information Technology policies were revised to\u00a0remove &#8220;Name&#8221; and &#8220;Date of Birth&#8221; from being classified as highly sensitive information: E.4.1. Administrative Data Access E.4.5. Electronic Storage of Highly Sensitive Data E.4.6. Data Classification E.4.7. Data Encryption You will find the policies in Book E, Administration and Finance, under Section 4, Information Technology. Click the [&hellip;]","og_url":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/","og_site_name":"University Policies","article_published_time":"2014-02-03T14:19:40+00:00","author":"UMW","twitter_card":"summary_large_image","twitter_misc":{"Written by":"UMW"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/#article","isPartOf":{"@id":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/"},"author":{"name":"UMW","@id":"https:\/\/www.umw.edu\/policies\/#\/schema\/person\/6be9e9198e9ea0116a675df5ae87ccc1"},"headline":"Revised Information Technology Policies","datePublished":"2014-02-03T14:19:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/"},"wordCount":68,"articleSection":["Policy News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/","url":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/","name":"Revised Information Technology Policies - University Policies","isPartOf":{"@id":"https:\/\/www.umw.edu\/policies\/#website"},"datePublished":"2014-02-03T14:19:40+00:00","author":{"@id":"https:\/\/www.umw.edu\/policies\/#\/schema\/person\/6be9e9198e9ea0116a675df5ae87ccc1"},"breadcrumb":{"@id":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.umw.edu\/policies\/2014\/02\/03\/revised-information-technology-policies-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.umw.edu\/policies\/"},{"@type":"ListItem","position":2,"name":"Revised Information Technology Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.umw.edu\/policies\/#website","url":"https:\/\/www.umw.edu\/policies\/","name":"University Policies","description":"University of Mary Washington","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.umw.edu\/policies\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.umw.edu\/policies\/#\/schema\/person\/6be9e9198e9ea0116a675df5ae87ccc1","name":"UMW","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/58b3ffd0b73294f863ad96fae57fa25580dcc3be1411bfc5177ea9fbd3615272?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/58b3ffd0b73294f863ad96fae57fa25580dcc3be1411bfc5177ea9fbd3615272?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58b3ffd0b73294f863ad96fae57fa25580dcc3be1411bfc5177ea9fbd3615272?s=96&d=mm&r=g","caption":"UMW"},"sameAs":["https:\/\/www.umw.edu"],"url":"https:\/\/www.umw.edu\/policies\/author\/umwwebmaster\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/posts\/3581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/comments?post=3581"}],"version-history":[{"count":0,"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/posts\/3581\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/media?parent=3581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/categories?post=3581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.umw.edu\/policies\/wp-json\/wp\/v2\/tags?post=3581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}