
Network Security Policies

Standards & Guidelines
The Information Security Plan and best practices serve as the minimum information security practices for sensitive data computer resources and associated communication networks.

Acceptable Use Policy
KCTCS requires all individuals to responsibly use information and the information technology employed to collect, process, store, and disseminate it.

Anti-Virus Protection
Current virus-checking programs help to ensure all web servers, local area network servers, mail servers, firewalls, and networked personal computers are properly secured and able to restrict and prevent unauthorized activity.

Remote Access
KCTCS limits the communication of data across remote connections with encrypted channels and protocols set up to serve remote access securely and effectively.

Breach Procedures
The Personal Information Security and Breach Investigation Procedures and Practices Act requires us to have policies and procedures to protect confidential and sensitive information.

Stay Up to Date
For tips and tricks to maintain security on your computer and network and to help protect the network and data of the system, check out our monthly newsletter Security Sense.