{"id":1808,"date":"2012-04-19T13:39:19","date_gmt":"2012-04-19T17:39:19","guid":{"rendered":"http:\/\/sites.scranton.edu\/tag\/?p=1808"},"modified":"2014-02-14T12:19:49","modified_gmt":"2014-02-14T17:19:49","slug":"privacy-and-confidentiality-policy-draft-review","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/tag\/2012\/04\/19\/privacy-and-confidentiality-policy-draft-review\/","title":{"rendered":"Privacy and Confidentiality Policy &#8211; Draft Review"},"content":{"rendered":"<p>The Information Management Advisory Committee (IMAC) has invited faculty review on a <a href=\"http:\/\/sites.scranton.edu\/tag\/files\/2012\/04\/privacy_and_confidentiality_draft-04-17-12.pdf\">draft of a Privacy and Confidentiality policy<\/a> being proposed by the Division of Planning and Information Resources (PIR).<\/p>\n<p>This policy, like the <a href=\"http:\/\/sites.scranton.edu\/tag\/2011\/12\/08\/incidental-use-policy-preliminary-review\/\">Incidental Use Policy<\/a>, is part of an ongoing effort to update and revise the <a title=\"Code of Responsible Computing\" href=\"http:\/\/matrix.scranton.edu\/pir\/planning\/Policy%20Files\/Code%20of%20Responsible%20Computing%20for%20Faculty_staff.pdf\" target=\"_blank\">Code of Responsible Computing<\/a>. Other policy updates will be forthcoming.<\/p>\n<p>IMAC has asked TAG to circulate this document among faculty members for early input.\u00a0 Please read through the <a href=\"http:\/\/sites.scranton.edu\/tag\/files\/2012\/04\/privacy_and_confidentiality_draft-04-17-12.pdf\">draft<\/a>, and if you have comments or concerns, send your feedback to TAG (<a title=\"TAG Discussion List\" href=\"mailto:tag-discussion@royallists.scranton.edu\" target=\"_blank\">tag-discussion@royallists.scranton.edu<\/a>) by May 8 so that we can share it at the next IMAC meeting on May 15.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Information Management Advisory Committee (IMAC) has invited faculty review on a draft of a Privacy and Confidentiality policy being proposed by the Division of Planning and Information Resources (PIR). This policy, like the Incidental Use Policy, is part of an ongoing effort to update and revise the Code of Responsible Computing. Other policy updates [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485],"tags":[727,534,591,592,653],"class_list":["post-1808","post","type-post","status-publish","format-standard","hentry","category-announcements","tag-acceptable-use-policy","tag-code-of-responsible-computing","tag-imac","tag-incidental-use-policy","tag-privacy-and-confidentiality-policy"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/1808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/comments?post=1808"}],"version-history":[{"count":1,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/1808\/revisions"}],"predecessor-version":[{"id":3233,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/1808\/revisions\/3233"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/media?parent=1808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/categories?post=1808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/tags?post=1808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}