{"643846":{"#nid":"643846","#data":{"type":"event","title":"Endpoint Compliance Phase 3 Deadline","body":[{"value":"\u003Cp\u003EIn response to the\u0026nbsp;\u003Ca href=\u0022https:\/\/www.news.gatech.edu\/2019\/11\/07\/tech-responds-student-data-disclosure\u0022 target=\u0022_blank\u0022\u003EFall 2019 data disclosure\u003C\/a\u003E, steps were taken to accelerate programs that protect data and how it is accessed and managed across the Institute. This included\u0026nbsp;\u003Ca href=\u0022https:\/\/policylibrary.gatech.edu\/information-technology\/cyber-security-policy\u0022\u003Erefined campus policies\u003C\/a\u003E\u0026nbsp;regarding the installation of\u0026nbsp;\u003Ca href=\u0022https:\/\/security.gatech.edu\/approved-endpoint-software\u0022\u003Emandatory computer endpoint management tools\u003C\/a\u003E.\u0026nbsp;IT professionals across Georgia Tech worked with faculty and staff to ensure Phase I compliance through the installation of basic cyber-security tools on all off-campus computer equipment\u0026nbsp;by June 15. The second phase\u0026nbsp;ensured\u0026nbsp;that all Georgia Tech-owned devices have endpoint management and protection tools installed by December 18, 2020.\u0026nbsp;Phase 3 of the Endpoint Compliance Campaign includes inventory of Institute-owned desktops, laptops, servers, and mobile devices by April 30, 2021.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EIn response to\u0026nbsp;\u003Ca href=\u0022https:\/\/www.news.gatech.edu\/2019\/11\/07\/tech-responds-student-data-disclosure\u0022 target=\u0022_blank\u0022\u003Elast fall\u0026#39;s data disclosure\u003C\/a\u003E, steps were taken to accelerate programs that protect data and how it is accessed and managed across the Institute. This included\u0026nbsp;\u003Ca href=\u0022https:\/\/policylibrary.gatech.edu\/information-technology\/cyber-security-policy\u0022\u003Enew campus policies\u003C\/a\u003E\u0026nbsp;regarding the installation of\u0026nbsp;\u003Ca href=\u0022https:\/\/security.gatech.edu\/approved-endpoint-software\u0022\u003Emandatory computer endpoint management tools\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Phase 3 of the Endpoint Compliance Campaign includes inventory of Institute-owned desktops, laptops, servers, and mobile devices."}],"uid":"34822","created_gmt":"2021-02-03 20:23:56","changed_gmt":"2021-02-03 20:25:15","author":"Malynda Dorsey","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2021-04-30T01:00:00-04:00","event_time_end":"2021-05-01T00:59:00-04:00","event_time_end_last":"2021-05-01T00:59:00-04:00","gmt_time_start":"2021-04-30 05:00:00","gmt_time_end":"2021-05-01 04:59:00","gmt_time_end_last":"2021-05-01 04:59:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[],"categories":[],"keywords":[{"id":"185634","name":"endpoint"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}