Social Engineering Security Policy
DOCUMENT INFORMATION |
|---|
| Document Title | Social Engineering Security Policy | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Document Type |
| ||||||||||||
| Office/Unit | Information Technology Services | ||||||||||||
| Document Owner | |||||||||||||
| Contact Information |
| ||||||||||||
| Approval Date | June 2, 2004 | ||||||||||||
| Approved by | President's Cabinet | ||||||||||||
| Effective Date | June 2, 2004 | ||||||||||||
| Review Date/Schedule | |||||||||||||
| Revision History |
DOCUMENT CONTENT |
|---|
PURPOSEThe purpose of this policy is to emphasize that information security (the protection of confidentiality and the integrity of confidential student and employee information) is the responsibility of each and every SUNY employee. “Social Engineering” is the term that describes non-technical ways by which hackers obtain information, usually by fooling people into giving up their own security. POLICYIt is the policy of SUNY Fredonia to ensure confidential physical information is protected. PROCEDUREThe following guidelines should be followed:
| |||
| FAQ's | |||
|---|---|---|---|
| Keywords | |||
| Category(s) |
| ||
| Sub-Category(s) | |||