{"id":2477,"date":"2021-03-11T15:55:31","date_gmt":"2021-03-11T20:55:31","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/?page_id=2477"},"modified":"2026-02-02T16:25:08","modified_gmt":"2026-02-02T21:25:08","slug":"information-technology-policies-procedures","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/","title":{"rendered":"Information Security Policy &amp; Standards"},"content":{"rendered":"<p class=\"\" data-start=\"125\" data-end=\"552\">The Library &amp; Information Technology Services (LITS) division supports the Trinity College community by managing and protecting the technology and information resources essential to our academic mission. To ensure the responsible use of these resources, safeguard our infrastructure, and mitigate legal and security risks, we maintain policies that promote ethical behavior and align with institutional goals. For a comprehensive list of official Trinity College policies, visit the <a class=\"\" href=\"https:\/\/www.trincoll.edu\" target=\"_new\" rel=\"noopener\" data-start=\"654\" data-end=\"706\">College Policies website<\/a>.<\/p>\n<p class=\"\" data-start=\"737\" data-end=\"918\">The LITS Division is committed to the secure, ethical, and effective use of technology and information services. To support this commitment, we maintain policies and standards that:<\/p>\n<ul data-start=\"920\" data-end=\"1046\">\n<li class=\"\" data-start=\"920\" data-end=\"961\">\n<p class=\"\" data-start=\"922\" data-end=\"961\">Promote responsible use of technology<\/p>\n<\/li>\n<li class=\"\" data-start=\"962\" data-end=\"1003\">\n<p class=\"\" data-start=\"964\" data-end=\"1003\">Uphold academic integrity and privacy<\/p>\n<\/li>\n<li class=\"\" data-start=\"1004\" data-end=\"1046\">\n<p class=\"\" data-start=\"1006\" data-end=\"1046\">Protect institutional data and systems<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1048\" data-end=\"1238\">We encourage all members of the Trinity community\u2014students, faculty, and staff\u2014to review these guidelines to understand their role in maintaining a secure and productive digital environment.<\/p>\n<p class=\"\" data-start=\"1240\" data-end=\"1271\"><a href=\"https:\/\/trincoll.sharepoint.com\/:u:\/s\/PolicyLibrary\/EZhMKRIi7R5AnvNKBg5LA2IBu_9YPc1cfxSdxGY5zStnLw?e=UmDL01\" target=\"_blank\" rel=\"noopener\"><strong data-start=\"885\" data-end=\"931\">LITS Policies and Standards<\/strong><\/a> (Trinity Login Required)<\/p>\n<p class=\"\" data-start=\"1273\" data-end=\"1413\">For questions, comments, or concerns, please contact the Information Security Team at <a rel=\"noopener\" data-start=\"1359\" data-end=\"1412\">security@trincoll.edu<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Library &amp; Information Technology Services (LITS) division supports the Trinity College community by managing and protecting the technology and information resources essential to our academic mission. To ensure the responsible use of these resources, safeguard our infrastructure, and mitigate legal and security risks, we maintain policies that promote ethical behavior and align with institutional [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":11137,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2477","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Policy &amp; Standards - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy &amp; Standards\" \/>\n<meta property=\"og:description\" content=\"The Library &amp; Information Technology Services (LITS) division supports the Trinity College community by managing and protecting the technology and information resources essential to our academic mission. To ensure the responsible use of these resources, safeguard our infrastructure, and mitigate legal and security risks, we maintain policies that promote ethical behavior and align with institutional [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T21:25:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\",\"name\":\"Information Security Policy &amp; Standards - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2021-03-11T20:55:31+00:00\",\"dateModified\":\"2026-02-02T21:25:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Information Security Policy &amp; Standards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security Policy &amp; Standards - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy &amp; Standards","og_description":"The Library &amp; Information Technology Services (LITS) division supports the Trinity College community by managing and protecting the technology and information resources essential to our academic mission. To ensure the responsible use of these resources, safeguard our infrastructure, and mitigate legal and security risks, we maintain policies that promote ethical behavior and align with institutional [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2026-02-02T21:25:08+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/","name":"Information Security Policy &amp; Standards - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2021-03-11T20:55:31+00:00","dateModified":"2026-02-02T21:25:08+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Information Security Policy &amp; Standards"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/2477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=2477"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/2477\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/11137"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=2477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}