{"id":287694,"date":"2020-01-22T11:08:41","date_gmt":"2020-01-22T17:08:41","guid":{"rendered":"http:\/\/itblog.lcisd.net\/?page_id=287694"},"modified":"2020-01-22T13:58:05","modified_gmt":"2020-01-22T19:58:05","slug":"cybersecurity-data-privacy","status":"publish","type":"page","link":"https:\/\/itblog.lcisd.net\/?page_id=287694","title":{"rendered":"Cybersecurity &#038; Data Privacy"},"content":{"rendered":"\n<p><strong>We are ALL responsible.<\/strong><\/p>\n\n\n\n<p>Each of us has the responsibility to protect Lubbock-Cooper ISD confidential data and information resources. Your partnership is critical to our district IT security goals and strategies.&nbsp;<\/p>\n\n\n\n<p>To review all established policies for IT security at Lubbock-Cooper ISD, please visit: <a href=\"http:\/\/www.lcisd.net\"><strong>www.lcisd.net<\/strong><\/a><strong> <\/strong>for Board Policy related to IT security.&nbsp;<br><\/p>\n\n\n\n<p><a href=\"https:\/\/pol.tasb.org\/Policy\/Download\/833?filename=CQB(LEGAL).pdf\">CQB(LEGAL)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/pol.tasb.org\/Policy\/Download\/833?filename=CQB(LOCAL).pdf\">CQB(LOCAL)<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<a href=\"https:\/\/itblog.lcisd.net\/wp-content\/uploads\/2017\/08\/SocialEngineeringRedFlagsMS.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">SocialEngineeringRedFlagsMS<\/a>\n\n\n\n<p><\/p>\n\n\n<a href=\"https:\/\/itblog.lcisd.net\/wp-content\/uploads\/2019\/09\/Practical-advice-for-avoiding-phishing-emails.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">Practical-advice-for-avoiding-phishing-emails<\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are ALL responsible. Each of us has the responsibility to protect Lubbock-Cooper ISD confidential data and information resources. Your partnership is critical to our district IT security goals and strategies.&nbsp; To review all established policies for IT security at<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"simple-restrict-permission":[],"class_list":["post-287694","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/pages\/287694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=287694"}],"version-history":[{"count":5,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/pages\/287694\/revisions"}],"predecessor-version":[{"id":287702,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=\/wp\/v2\/pages\/287694\/revisions\/287702"}],"wp:attachment":[{"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=287694"}],"wp:term":[{"taxonomy":"simple-restrict-permission","embeddable":true,"href":"https:\/\/itblog.lcisd.net\/index.php?rest_route=%2Fwp%2Fv2%2Fsimple-restrict-permission&post=287694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}