{"id":8537,"date":"2025-01-29T16:49:18","date_gmt":"2025-01-29T21:49:18","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/collaboration-matrix\/"},"modified":"2025-04-10T12:43:17","modified_gmt":"2025-04-10T16:43:17","slug":"collaboration-matrix","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/","title":{"rendered":"Collaboration Tools Matrix"},"content":{"rendered":"<p>&nbsp;<\/p>\n<table style=\"height: 254px;width: 91.8743%;border-collapse: collapse\" cellspacing=\"15\" cellpadding=\"15\">\n<tbody>\n<tr style=\"height: 24px\">\n<td style=\"width: 67.3338%;height: 24px;background-color: #cccccc;text-align: center;border-style: solid;border-color: #000000\">Product, Service, or Tool<\/td>\n<td style=\"width: 7.8256%;height: 24px;background-color: #0fde04;text-align: center;border-style: solid;border-color: #000000\">Level 1<\/td>\n<td style=\"width: 8.04447%;height: 24px;background-color: #e8e117;text-align: center;border-style: solid;border-color: #000000\">Level 2<\/td>\n<td style=\"width: 8.49248%;height: 24px;background-color: #fca417;text-align: center;border-style: solid;border-color: #000000\">Level 3<\/td>\n<td style=\"width: 48.4627%;height: 24px;background-color: #eb1c34;text-align: center;border-style: solid;border-color: #000000\">Level 4<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 20px;border-style: solid;border-color: #000000\" data-celllook=\"4369\"><b><span data-contrast=\"auto\">Consumer Email<\/span><\/b><span data-ccp-props=\"{}\"> \u00a0<\/span><i><span data-contrast=\"auto\">(@Gmail, @Yahoo, @outlook, etc.)<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/td>\n<td style=\"width: 7.8256%;height: 20px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u2705<\/td>\n<td style=\"width: 8.04447%;height: 20px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u2796<\/td>\n<td style=\"width: 8.49248%;height: 20px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u274c<\/td>\n<td style=\"width: 48.4627%;height: 20px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u00a0 \u00a0\u274c<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 18px;border-style: solid;border-color: #000000\" data-celllook=\"69905\"><b><span data-contrast=\"auto\">Consumer Google Workspace<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><i><span data-contrast=\"auto\">(Google Docs, Drive, etc.)<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/td>\n<td style=\"width: 7.8256%;height: 18px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2705<\/td>\n<td style=\"width: 8.04447%;height: 18px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2796<\/td>\n<td style=\"width: 8.49248%;height: 18px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u274c<\/td>\n<td style=\"width: 48.4627%;height: 18px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u00a0 \u00a0\u274c<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 10px;border-style: solid;border-color: #000000\" data-celllook=\"4369\"><b><span data-contrast=\"auto\">Consumer File Sharing<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><i><span data-contrast=\"auto\">(Dropbox, Evernote, etc.)<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/td>\n<td style=\"width: 7.8256%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u2705<\/td>\n<td style=\"width: 8.04447%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u2796<\/td>\n<td style=\"width: 8.49248%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u274c<\/td>\n<td style=\"width: 48.4627%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u00a0 \u00a0\u274c<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 10px;border-style: solid;border-color: #000000\" data-celllook=\"69905\"><b><span data-contrast=\"auto\">Consumer Project Management Tools<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><i><span data-contrast=\"auto\">(Slack, Jira, Zoho, Monday, SmartSheets, etc.)<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/td>\n<td style=\"width: 7.8256%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2705<\/td>\n<td style=\"width: 8.04447%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2796<\/td>\n<td style=\"width: 8.49248%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u274c<\/td>\n<td style=\"width: 48.4627%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u00a0 \u00a0\u274c<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 10px;border-style: solid;border-color: #000000\" data-celllook=\"4369\"><strong>Trinity M365 Email<\/strong><\/td>\n<td style=\"width: 7.8256%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u2705<\/td>\n<td style=\"width: 8.04447%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u2705<\/td>\n<td style=\"width: 8.49248%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u274c<\/td>\n<td style=\"width: 48.4627%;height: 10px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"4369\">\u00a0 \u00a0\u274c<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 15px;border-style: solid;border-color: #000000\" data-celllook=\"69905\"><strong>Trinity M365 Applications<\/strong><span data-ccp-props=\"{}\">\u00a0<\/span><span data-contrast=\"auto\">(Teams, <\/span><span data-contrast=\"auto\">OneDrive, SharePoint)<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/td>\n<td style=\"width: 7.8256%;height: 15px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2705<\/td>\n<td style=\"width: 8.04447%;height: 15px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2705<\/td>\n<td style=\"width: 8.49248%;height: 15px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u2705<\/td>\n<td style=\"width: 48.4627%;height: 15px;border-style: solid;border-color: #000000;text-align: center\" data-celllook=\"69905\">\u00a0 \u00a0\u274c<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;border-style: solid;border-color: #000000;height: 44px\"><strong>Trinity M365 Email with Message Encryption<\/strong><\/td>\n<td style=\"width: 7.8256%;border-style: solid;border-color: #000000;height: 44px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.04447%;border-style: solid;border-color: #000000;height: 44px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.49248%;border-style: solid;border-color: #000000;height: 44px;text-align: center\">\u2705<\/td>\n<td style=\"width: 48.4627%;border-style: solid;border-color: #000000;height: 44px;text-align: center\">\u00a0 \u00a0\u2705<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 21px;border-style: solid;border-color: #000000\" data-celllook=\"4369\"><strong>Trinity SharePoint with L4 Configuration<\/strong><\/td>\n<td style=\"width: 7.8256%;border-style: solid;border-color: #000000;height: 21px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.04447%;border-style: solid;border-color: #000000;height: 21px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.49248%;border-style: solid;border-color: #000000;height: 21px;text-align: center\">\u2705<\/td>\n<td style=\"width: 48.4627%;border-style: solid;border-color: #000000;height: 21px\"><sup>\u00a0 \u00a0*<\/sup>\u2705<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;border-style: solid;border-color: #000000;height: 45px\"><strong>Trinity Network File Share<span data-ccp-props=\"{}\"> (Retiring) <\/span><span data-contrast=\"auto\">(Tamba, Zep, etc.)<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/strong><\/td>\n<td style=\"width: 7.8256%;border-style: solid;border-color: #000000;height: 45px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.04447%;border-style: solid;border-color: #000000;height: 45px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.49248%;border-style: solid;border-color: #000000;height: 45px;text-align: center\">\u2705<\/td>\n<td style=\"width: 48.4627%;border-style: solid;border-color: #000000;height: 45px\"><sup>\u00a0 \u00a0*<\/sup>\u2705<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;border-style: solid;border-color: #000000;height: 27px\"><strong>Trinity Qualtrics with L4 Configuration<\/strong><\/td>\n<td style=\"width: 7.8256%;border-style: solid;border-color: #000000;height: 27px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.04447%;border-style: solid;border-color: #000000;height: 27px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.49248%;border-style: solid;border-color: #000000;height: 27px;text-align: center\">\u2705<\/td>\n<td style=\"width: 48.4627%;border-style: solid;border-color: #000000;height: 27px\"><sup>\u00a0 \u00a0*<\/sup>\u2705<\/td>\n<\/tr>\n<tr style=\"height: 13px\">\n<td style=\"width: 67.3338%;height: 10px;border-style: solid;border-color: #000000\" data-celllook=\"69905\"><span data-ccp-props=\"{}\"> <strong>Trinity Zoom Virtual Meetings<\/strong>\u00a0<\/span><\/td>\n<td style=\"width: 7.8256%;border-style: solid;border-color: #000000;height: 10px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.04447%;border-style: solid;border-color: #000000;height: 10px;text-align: center\">\u2705<\/td>\n<td style=\"width: 8.49248%;border-style: solid;border-color: #000000;height: 10px;text-align: center\">\u2705<\/td>\n<td style=\"width: 48.4627%;border-style: solid;border-color: #000000;height: 10px\"><sup>\u00a0**<\/sup>\u2705<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u2796 Consumer versions are not recommended for college business.<\/p>\n<p><sup>*<\/sup>\u00a0Special configuration\/request required<\/p>\n<p><sup>**<\/sup>\u00a0No \u201clocal\u201d recording<\/p>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden view-mode-full\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>See the <a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/best-practices\/data-classification-collaboration\/data-classification\/\">Data Classification Guides<\/a> for examples of data at levels one through four.<\/p>\n<p class=\"\" data-start=\"66\" data-end=\"363\">Consumer Resources are materials, products, services, or information that are not endorsed or recognized by the institution. These resources are considered unofficial and may not meet the institution&#8217;s standards for reliability, trustworthiness, or suitability for use by clients or customers.<\/p>\n<p class=\"\" data-start=\"365\" data-end=\"949\">Trinity Technology Resources refers to the systems, technologies, and information resources necessary for processing, storing, and communicating information. These resources may be individually controlled or shared, stand-alone or networked. They include classroom technologies, electronic resources, and computing and communication devices such as computers, printers, storage devices, mobile devices, email, fax, video, multimedia tools, and healthcare, research, and administrative systems. Personal devices connected to the College network are also subject to these guidelines.<\/p>\n<p class=\"\" data-start=\"951\" data-end=\"1348\">College business conducted using official College tools complies with institutional regulations and policies. These tools are protected by contractual agreements and security measures not typically found with consumer-grade resources. Please note that this document may not cover every scenario, so it\u2019s important to exercise discretion and follow the evolving procedures and policies accordingly.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Product, Service, or Tool Level 1 Level 2 Level 3 Level 4 Consumer Email \u00a0(@Gmail, @Yahoo, @outlook, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer Google Workspace\u00a0(Google Docs, Drive, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer File Sharing\u00a0(Dropbox, Evernote, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer Project Management Tools\u00a0(Slack, Jira, Zoho, Monday, SmartSheets, etc.)\u00a0 \u2705 [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":8451,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8537","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Collaboration Tools Matrix - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Collaboration Tools Matrix\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Product, Service, or Tool Level 1 Level 2 Level 3 Level 4 Consumer Email \u00a0(@Gmail, @Yahoo, @outlook, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer Google Workspace\u00a0(Google Docs, Drive, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer File Sharing\u00a0(Dropbox, Evernote, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer Project Management Tools\u00a0(Slack, Jira, Zoho, Monday, SmartSheets, etc.)\u00a0 \u2705 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-10T16:43:17+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/\",\"name\":\"Collaboration Tools Matrix - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2025-01-29T21:49:18+00:00\",\"dateModified\":\"2025-04-10T16:43:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance Risk and Compliance\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Information Security Policy &amp; Standards\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Data Classification &amp; Collaboration\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Collaboration Tools Matrix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Collaboration Tools Matrix - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/","og_locale":"en_US","og_type":"article","og_title":"Collaboration Tools Matrix","og_description":"&nbsp; Product, Service, or Tool Level 1 Level 2 Level 3 Level 4 Consumer Email \u00a0(@Gmail, @Yahoo, @outlook, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer Google Workspace\u00a0(Google Docs, Drive, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer File Sharing\u00a0(Dropbox, Evernote, etc.)\u00a0 \u2705 \u2796 \u274c \u00a0 \u00a0\u274c Consumer Project Management Tools\u00a0(Slack, Jira, Zoho, Monday, SmartSheets, etc.)\u00a0 \u2705 [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2025-04-10T16:43:17+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/","name":"Collaboration Tools Matrix - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2025-01-29T21:49:18+00:00","dateModified":"2025-04-10T16:43:17+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/collaboration-matrix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Governance Risk and Compliance","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/"},{"@type":"ListItem","position":5,"name":"Information Security Policy &amp; Standards","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/"},{"@type":"ListItem","position":6,"name":"Data Classification &amp; Collaboration","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/governance-risk-and-compliance\/information-technology-policies-procedures\/data-classification-collaboration\/"},{"@type":"ListItem","position":7,"name":"Collaboration Tools Matrix"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=8537"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8537\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/8451"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=8537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}