{"id":2025,"date":"2023-12-20T09:53:49","date_gmt":"2023-12-20T09:53:49","guid":{"rendered":"http:\/\/10.50.124.17\/?page_id=2025"},"modified":"2024-01-01T14:23:46","modified_gmt":"2024-01-01T14:23:46","slug":"security-extension-to-appropriate-use-policy","status":"publish","type":"page","link":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/security-extension-to-appropriate-use-policy\/","title":{"rendered":"Security Extension to Appropriate Use Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2025\" class=\"elementor elementor-2025\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff2d188 e-flex e-con-boxed e-con e-parent\" data-id=\"ff2d188\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fb24f82 e-con-full e-flex e-con e-child\" data-id=\"fb24f82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25ca484 elementor-widget elementor-widget-text-editor\" data-id=\"25ca484\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Aamusted University Security Extension to Appropriate Use Policy<\/h3><h5>Section 1: PURPOSE<\/h5><p>This Security Extension to the Appropriate Use Policy outlines additional guidelines and standards aimed at enhancing the security posture of Aamusted University&#8217;s Information Technology Systems (ITS) resources. It serves to fortify the responsible and acceptable use of technology, ensuring the protection of sensitive data and the integrity of the university&#8217;s IT environment.<\/p><h5>Section 2: ACCEPTABLE SECURITY PRACTICES<\/h5><h5>2.1 Password Management:<\/h5><p>&#8211; Users must adhere to strong password practices, including regular updates and the avoidance of easily guessable passwords.<br \/>&#8211; Multi-factor authentication is strongly encouraged for an added layer of security.<\/p><h5>2.2 Data Encryption:<\/h5><p>&#8211; Sensitive data, both in transit and at rest, must be encrypted to prevent unauthorized access.<\/p><h5>2.3 Endpoint Security:<\/h5><p>&#8211; University-owned devices must have up-to-date antivirus software, and users are encouraged to employ security measures on personally-owned devices accessing university resources.<\/p><h5>2.4 Wireless Network Security:<\/h5><p>&#8211; Users must connect only to secure and authorized wireless networks.<br \/>&#8211; Ad-hoc network creation is strictly prohibited to prevent security vulnerabilities.<\/p><h5>Section 3: SECURITY INCIDENT REPORTING<\/h5><h5>3.1 Prompt Reporting:<\/h5><p>&#8211; Users are obligated to report any suspected security incidents promptly to the IT Security team.<\/p><h5>3.2 Collaboration with IT Security:<\/h5><p>&#8211; Cooperation with the IT Security team during security investigations is mandatory for all users.<\/p><h5>Section 4: THIRD-PARTY SOFTWARE AND SERVICES<\/h5><h5>4.1 Approval Process:<\/h5><p>&#8211; The use of third-party software or services that involve university data must be approved by the IT Security team to ensure compliance with security standards.<\/p><h5>Section 5: REMOTE ACCESS<\/h5><h5>5.1 Secure Connection:<\/h5><p>&#8211; Remote access to university resources must be conducted through secure and approved methods, such as Virtual Private Network (VPN) connections.<\/p><h5>Section 6: SECURITY AWARENESS TRAINING<\/h5><h5>6.1 Mandatory Training:<\/h5><p>&#8211; Users must participate in periodic security awareness training to stay informed about the latest security threats and best practices.<\/p><h5>Section 7: COMPLIANCE AND ENFORCEMENT<\/h5><h5>7.1 Security Audits:<\/h5><p>&#8211; Regular security audits will be conducted to assess compliance with these security extensions.<br \/>&#8211; Non-compliance may result in the suspension of IT privileges and disciplinary action.<\/p><h5>Section 8: POLICY REVIEW AND AMENDMENT<\/h5><h5>8.1 Regular Review:<\/h5><p>&#8211; These security extensions will undergo regular reviews by the Office of Information Technology and CIO to address evolving security challenges.<\/p><h5>8.2 Amendment Process:<\/h5><p>&#8211; Proposed amendments will be evaluated, and revisions will occur when deemed necessary to enhance security measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-afa6dae e-con-full e-flex e-con e-child\" data-id=\"afa6dae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff060ce elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"ff060ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/itdirectorate.aamusted.edu.gh\/?page_id=1934\">Other Policies<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-006438a elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"006438a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/itdirectorate.aamusted.edu.gh\/?page_id=937\">Explore our services<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Aamusted University Security Extension to Appropriate Use Policy Section 1: PURPOSE This Security Extension to the Appropriate Use Policy outlines additional guidelines and standards aimed at enhancing the security posture of Aamusted University&#8217;s Information Technology Systems (ITS) resources. It serves to fortify the responsible and acceptable use of technology, ensuring the protection of sensitive data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2025","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/2025"}],"collection":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/comments?post=2025"}],"version-history":[{"count":10,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/2025\/revisions"}],"predecessor-version":[{"id":2178,"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/pages\/2025\/revisions\/2178"}],"wp:attachment":[{"href":"https:\/\/itdirectorate.aamusted.edu.gh\/index.php\/wp-json\/wp\/v2\/media?parent=2025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}