{"id":2001,"date":"2012-10-16T13:45:41","date_gmt":"2012-10-16T17:45:41","guid":{"rendered":"http:\/\/sites.scranton.edu\/tag\/?p=2001"},"modified":"2012-10-16T13:45:41","modified_gmt":"2012-10-16T17:45:41","slug":"guidelines-for-the-use-of-cloud-computing","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/tag\/2012\/10\/16\/guidelines-for-the-use-of-cloud-computing\/","title":{"rendered":"Guidelines for the use of Cloud Computing"},"content":{"rendered":"<p>On Thursday of last week Jerry DeSanto, the VP for Planning and CIO, sent out an email introducing the faculty to the outlining some guidelines as to the appropriate use of Cloud Computing.  Cloud computing can prove a <a href=\"http:\/\/sites.scranton.edu\/tag\/2012\/09\/11\/ferpa-considerations-for-cloud-services\/\" title=\"FERPA considerations for cloud\u00a0services\" target=\"_blank\">significant risk to student privacy<\/a> which needs to be taken into consideration when faculty consider their use.<\/p>\n<p>You can download a PDF copy of the guidelines <a href=\"http:\/\/sites.scranton.edu\/tag\/files\/2012\/10\/2012-guidelines-for-cloud-services-w-checklist.pdf\" title=\"Guideline for Cloud Services\" target=\"_blank\">here.<\/a><\/p>\n<p>We recommend that faculty read this document to inform themselves about what Cloud Computing is, as well as what risks they adopt by using the service.  If you have any questions, please feel free to send them to <a href=\"mailto:tag-members@royallists.scranton.edu\" title=\"TAG Members Email List\" target=\"_blank\">tag-members@royallists.scranton.edu<\/a>.<\/p>\n<p>TAG is also in the process of writing a <a href=\"http:\/\/sites.scranton.edu\/tag\/faq\/cloud-computing-services\/\" title=\"Cloud Computing\u00a0Services\" target=\"_blank\">memo<\/a> about the privacy consideration of some cloud computing services, which we hope to distribute later this semester.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Thursday of last week Jerry DeSanto, the VP for Planning and CIO, sent out an email introducing the faculty to the outlining some guidelines as to the appropriate use of Cloud Computing. Cloud computing can prove a significant risk to student privacy which needs to be taken into consideration when faculty consider their use. [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485],"tags":[529,585],"class_list":["post-2001","post","type-post","status-publish","format-standard","hentry","category-announcements","tag-cloud-computing","tag-guidelines"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/2001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/comments?post=2001"}],"version-history":[{"count":0,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/2001\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/media?parent=2001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/categories?post=2001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/tags?post=2001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}