{"id":212,"date":"2019-10-24T15:12:10","date_gmt":"2019-10-24T19:12:05","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/?page_id=212"},"modified":"2025-10-30T13:15:29","modified_gmt":"2025-10-30T17:15:29","slug":"security","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<h2>Welcome!<\/h2>\n<p>The <b>Information Security Team (IST)<\/b> at Trinity College is dedicated to maintaining a <b>safe and trusted digital environment<\/b> for our entire community. Our mission is to proactively <b>safeguard the confidentiality, integrity, and availability<\/b> of all the College\u2019s valuable digital assets, including sensitive student data, faculty research, and institutional records.<\/p>\n<p>In an era of constantly evolving cyber threats, information security is more critical than ever. The IST is committed to staying ahead of these risks by:<\/p>\n<ul>\n<li>Implementing cutting-edge security measures across our networks and systems.<\/li>\n<li>Maintaining a vigilant and adaptive posture to ensure the resilience of the College\u2019s digital ecosystem.<\/li>\n<li>Rapidly responding to potential threats and vulnerabilities.<\/li>\n<\/ul>\n<p>Our goal is simple: to provide a secure space where students, faculty, and staff can work, learn, and grow, fully supporting the institution&#8217;s academic mission without fear of compromise.<\/p>\n<h2>Security is a Shared Responsibility<\/h2>\n<p>A strong security posture depends on every member of the Trinity College community being an essential partner. We are actively building a culture of security where each individual is empowered to contribute to a safer, more resilient environment.<\/p>\n<p>Security is everyone\u2019s responsibility. Together, we ensure the ongoing success and trust of Trinity College\u2019s digital future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome! The Information Security Team (IST) at Trinity College is dedicated to maintaining a safe and trusted digital environment for our entire community. Our mission is to proactively safeguard the confidentiality, integrity, and availability of all the College\u2019s valuable digital assets, including sensitive student data, faculty research, and institutional records. In an era of constantly [&hellip;]<\/p>\n","protected":false},"author":161,"featured_media":0,"parent":150,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-212","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security\" \/>\n<meta property=\"og:description\" content=\"Welcome! The Information Security Team (IST) at Trinity College is dedicated to maintaining a safe and trusted digital environment for our entire community. Our mission is to proactively safeguard the confidentiality, integrity, and availability of all the College\u2019s valuable digital assets, including sensitive student data, faculty research, and institutional records. In an era of constantly [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-30T17:15:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\",\"name\":\"Information Security - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2019-10-24T19:12:05+00:00\",\"dateModified\":\"2025-10-30T17:15:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security","og_description":"Welcome! The Information Security Team (IST) at Trinity College is dedicated to maintaining a safe and trusted digital environment for our entire community. Our mission is to proactively safeguard the confidentiality, integrity, and availability of all the College\u2019s valuable digital assets, including sensitive student data, faculty research, and institutional records. In an era of constantly [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2025-10-30T17:15:29+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/","name":"Information Security - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2019-10-24T19:12:05+00:00","dateModified":"2025-10-30T17:15:29+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/212\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/150"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}