{"id":4728,"date":"2015-12-04T18:06:18","date_gmt":"2015-12-04T18:06:18","guid":{"rendered":"http:\/\/www.smcm.edu\/it\/?page_id=4728"},"modified":"2025-10-24T21:17:49","modified_gmt":"2025-10-24T21:17:49","slug":"policies","status":"publish","type":"page","link":"https:\/\/www.smcm.edu\/it\/policies\/","title":{"rendered":"Policies"},"content":{"rendered":"<h2>New &amp; Recently Updated<\/h2>\n<ul>\n<li>\n<h3 style=\"margin-top: 20px\"><a href=\"https:\/\/www.smcm.edu\/it\/wp-content\/uploads\/sites\/2\/2019\/01\/epeat-policy.pdf\">EPEAT, Electronic Product Environmental Assessment Tool, Policy (PDF)<\/a><\/h3>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<h3 style=\"margin-top: 20px\"><a href=\"https:\/\/www.smcm.edu\/it\/wp-content\/uploads\/sites\/2\/2018\/06\/Email-Policy-2018.pdf\">Email Policy 2018 (PDF)<\/a><\/h3>\n<\/li>\n<li>\n<h3 style=\"margin-top: 20px\"><a href=\"https:\/\/www.smcm.edu\/it\/wp-content\/uploads\/sites\/2\/2022\/08\/Administrative-Rights-Policy.pdf\">Administrative Rights Policy (PDF)<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.smcm.edu\/it\/wp-content\/uploads\/sites\/2\/2023\/12\/OneCard-Policy-Fac-Staff-Student-1.pdf\">One Card Policy<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.smcm.edu\/it\/wp-content\/uploads\/sites\/2\/2023\/10\/Maryland-IT-Security-Manual-v1-2.pdf\">Maryland Department of Information Technology Security Manual\u00a0<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.nist.gov\/cybersecurity\">National Institute of Standards and Technology\u00a0<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.sans.org\/security-awareness-training\/\">SANS Institute Cybersecurity Training<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/owasp.org\/\">Open Web Application Security Project<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.cisecurity.org\/\">Center for Internet Security<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.anthology.com\/trust-center\/security\">Anthology Product Security<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.smcm.edu\/app\/uploads\/sites\/2\/2025\/10\/Lab-Software-Deployment-Requests.pdf\" target=\"_blank\" rel=\"noopener\">Lab Software Deployment<\/a><\/h3>\n<\/li>\n<\/ul>\n<h3>OIT Policy 1 \u2013 Use of College IT Resources<\/h3>\n<div class=\"accordion\">\n<h4>1.1 Appropriate Use of College IT Resources<\/h4>\n<div>\n<div id=\"main-content\">\n<p>Members of the St. Mary\u2019s College of Maryland community have a responsibility to act honorably, with integrity, fairness, and respect for others. This responsibility extends to use of the information technology resources of the College. In order to support and enhance the College\u2019s educational mission, faculty, staff, registered students, and special guests are granted access to information technology resources owned and supported by the College. These resources should be used in a responsible manner, with care and concern for the needs and rights of others.<\/p>\n<p>&nbsp;<\/p>\n<h4 id=\"id-11AppropriateUseofCollegeITResources-AUseSharedResourcesResponsibly\">A. Use Shared Resources Responsibly.<\/h4>\n<hr \/>\n<ol>\n<li>Be considerate in your use of shared resources. For example, you should avoid controlling or degrading computer systems, overloading networks with large email attachments, taking up lots of disk space with personal files or with obsolete work files, or wasting printer paper, ink, and toner on unnecessary printing jobs.<\/li>\n<li>Be mindful of the electricity consumed in operating computing equipment.\u00a0 Power down your desktop or laptop computer during extended periods of inactivity.<\/li>\n<li>Exercise a due regard for others in your use of computing facilities on campus (computer classrooms, labs, library computers, etc.).<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4 id=\"id-11AppropriateUseofCollegeITResources-BUsetheCollegeNetworkResponsibly\">B. Use the College Network Responsibly.<\/h4>\n<hr \/>\n<ol>\n<li>Faculty, staff, and students are given College network accounts so that they can securely access networked services (e.g., internet access, email, printing, file storage) and systems (e.g., Portal, Blackboard, CARS) that support research, education, service, and administrative activities.<\/li>\n<li>Do not log onto the College network using another person\u2019s credentials (user name and password) unless you are an OIT staff person providing network-related assistance to that person. Willful misrepresentation of yourself as another individual is not allowed on the College network and may result in the loss of user privileges.<\/li>\n<li>Similarly, do not share your College network credentials with anyone besides OIT support staff.\u00a0 If someone else logs onto the network using your credentials, you can be held co-responsible for the trespass and may lose your user privileges.<\/li>\n<li>Exercise responsibility for quickly resetting your College network account password when prompted to do so.\u00a0 Register with <a href=\"https:\/\/password.smcm.edu\" target=\"_blank\" rel=\"nofollow noopener\">Password Manager<\/a> so that you can unlock your network account or reset your password without needing to rely on OIT staff to assist you.<\/li>\n<li>Whenever possible, staff and faculty should turn on and connect their assigned College-owned computer(s) to the College network for an extended period at least once weekly. This will allow the machine(s) to receive software updates, policy updates, and College-specific configuration updates.<\/li>\n<li>Whenever possible, store work-related electronic files in folders on the College network, not in local folders on your College-owned computer, on a personal computer, on an external hard drive, or on a thumb drive.\u00a0 Files stored on the College network are better protected from misuse or theft, are backed-up regularly by OIT staff, and can be recovered after hardware failure.\u00a0 It is your responsibility to regularly back up, and to protect against misuse or theft, any files that you choose to store in local folders on your\u00a0College-owned computer.\u00a0 (In the event of a hardware failure to a College-owned desktop or laptop computer, OIT staff will do whatever is reasonable to restore the machine to its state prior to failure.\u00a0 However, they may not be able to save and restore the lost information that was stored locally on the machine.)\u00a0 <strong>Never store work-related files containing confidential information (e.g., files that contain College IDs, social security numbers, grades, test scores, birth dates, and other personally identifiable information) on a non-secured personal computer, external hard drive, or thumb drive.<\/strong><\/li>\n<li>Do not use College electronic resources to violate city, state, federal or international laws, rules, regulations, rulings or orders, or to otherwise violate College rules. Such misuse could result in expulsion or termination of employment.<\/li>\n<li>As a corollary to the general prohibition on illegal use of the College network, do not illegally download or distribute copyright-protected online content over the College network.\u00a0 Many software programs, images, sounds, text, and related materials are owned by individual users or third parties, and are protected by copyright and other laws, by licenses and other contractual agreements. You must abide by these restrictions, because to do otherwise is a violation of copyright law.\u00a0 Such restrictions may include prohibitions against copying data, images, sounds, or programs, the resale of this material or the use of this material for non-educational purposes or for financial gain, and public disclosure of information about programs (e.g. source code) without the owner\u2019s authorization.<sup>1<\/sup><\/li>\n<li>Make sure that your use of the College\u2019s network or computing facilities does not violate the privacy of other users, even if unintentionally. Specifically, don\u2019t try to access the files or directories of another user without clear authorization from that user. Typically, this authorization is signaled by the other user\u2019s setting file access permissions to allow public or group reading of the files.<\/li>\n<li>When an individual is alleged to be abusing network or other computing resources, any or all of his or her network and computing privileges may be suspended immediately to protect the resources and to assure reliable service to the rest of the campus community. Any alleged infraction that results in suspension of any or all privileges will be forwarded to an appropriate campus authority for timely review. The individual will be notified through campus or US mail or by a personal visit from a College representative. If appropriate, the matter may also be referred to the appropriate county, state, or federal authorities.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4 id=\"id-11AppropriateUseofCollegeITResources-CUseCollegeEmailResponsibly\">C. Use College Email Responsibly.<\/h4>\n<hr \/>\n<ol>\n<li>IT resources devoted to the transmission and storage of electronic mail are a fixed asset that must be shared by all members of the College community.\u00a0 Moreover, email messages are treated like other college records and are retained in accordance with state and federal laws; they may be obtained by subpoena and used in administrative, judicial, or other proceedings. Therefore, both narrow self-interest and a concern for the needs of others dictate that you should limit use of your College email account to communication that is consistent with your official role at the College.\u00a0 Specifically,<\/li>\n<li>Do not use your College email account for solicitations.\u00a0 This includes solicitations for outside business ventures, personal parties, social meetings, membership in personal organizations, political causes, religious causes, or other matters not connected to the business of the College.<\/li>\n<li>Do not use your College email account to advertise personal articles for sale or for purchase.<\/li>\n<li>Do not send, or respond to, email chain letters.<\/li>\n<li>Do not send sensitive or confidential information via College email when it is possible to convey it effectively in person or via a phone call.<\/li>\n<li>Do not use College email to harass, intimidate, or annoy others.\u00a0 Inappropriate or offensive messages such as racial, sexual, or religious slurs are prohibited. Violation of this policy will lead to discipline, which may include termination of employment, suspension, or expulsion. Use of mail to harass, intimidate or otherwise annoy another person, such as broadcasting unsolicited messages or sending unwanted mail, is expressly prohibited. This also applies to material originating from this campus but sent to other sites or persons on the Internet.<\/li>\n<li>Do not permit anyone else to use your College email account. You will be held co-responsible for any correspondence originating from your account.<\/li>\n<li>Do not edit or alter another person\u2019s email message and then forward it to another person or group.<\/li>\n<li>Depending on the frequency and\/or severity of the offense,\u00a0a violation\u00a0of rules 2-8\u00a0can lead to loss of one\u2019s access to \u2018All\u2019 email distribution lists or even to loss of\u00a0one\u2019s College email\u00a0account. OIT staff are not authorized to\u00a0detect such violations\u00a0by\u00a0inspecting the content of email messages on the email server.\u00a0 Instead, findings of inappropriate use of College email resources\u00a0leading to withdrawal of email privileges would be based on reports or complaints from individuals receiving email messages of an inappropriate nature.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4 id=\"id-11AppropriateUseofCollegeITResources-DFollowProperProceduresforAcquiringUsingComputingEquipment\">D. Follow Proper Procedures for Acquiring &amp; Using Computing Equipment.<\/h4>\n<hr \/>\n<ol>\n<li>All\u00a0computers, computer peripherals (e.g., monitors, keyboards), tablets, and other computing equipment purchased from College funds or from grants awarded under College sponsorship.are the property of the College under the stewardship of the Office of Information Technology (OIT).<\/li>\n<li>All purchases of computing equipment from College funds or from grants awarded under College sponsorship must be managed by, or coordinated with, OIT Desktop Support Services.<\/li>\n<li>Take due care not to damage, lose, or negligently expose to theft, damage, or misuse by others, any College-owned computing equipment to which you are assigned or granted access.\u00a0 Any damage, loss, theft, or suspected misuse of college-owned computing equipment should be reported promptly to the IT Support Center (240-895-4357).<\/li>\n<li>College-owned desktop computing equipment \u2013 central processing units, also monitors and other peripherals\u00a0\u2013 should not be physically disconnected from the network or removed from the office or learning space to which it is assigned without first obtaining permission to do so from OIT Desktop Support Services (240-895-4357).<\/li>\n<li>All College-owned computing equipment \u2013 including laptops and tablets\u00a0\u2013 must be made available to OIT Desktop Services once each year for inventory and maintenance purposes.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4 id=\"id-11AppropriateUseofCollegeITResources-EFollowProperProceduresforAcquiringInstallingSoftware\">E. Follow Proper Procedures for Acquiring &amp; Installing Software.<\/h4>\n<hr \/>\n<ol>\n<li>All purchases of software from College funds or from grants awarded under College sponsorship must be managed by, or coordinated with, OIT Desktop Services. Contact the IT Support Center\u00a0(240-895-4357) to set up a purchase consultation with a member of OIT Desktop Services.<\/li>\n<li>Provide\u00a0OIT Desktop Support Services with installation codes, serial numbers, license agreements and vendor information for any software purchased from college funds or from grants awarded under College sponsorship.\u00a0\u00a0 This information is required for inventory and accounting control purposes.<\/li>\n<li>You are encouraged also to provide OIT with backup copies of any media discs (CDs, DVDs) used in installing software purchased from College funds or from grants awarded under College sponsorship.\u00a0 Keep original discs in your possession so that you can readily access them as the need arises.<\/li>\n<li>Contact the OIT Support Center (240-895-4357) for assistance with installing software on a College-owned computer.<\/li>\n<li>OIT typically grants administrative privileges to faculty and staff who would like to install software on College-owned computers without OIT assistance.<\/li>\n<\/ol>\n<p><sup>1 <\/sup>This\u00a0prohibition does not apply, of course,\u00a0to Library Electronic Course Reserves or postings of copyrighted materials within Blackboard for course use that adhere to accepted Fair Use provisions of copyright law and related accepted guidelines for the educational use of copyrighted material.<\/p>\n<\/div>\n<\/div>\n<h4>1.2 Appropriate Use of Campus Computing Facilities<\/h4>\n<div>\n<p>Exercise a due regard for others in your use of computing facilities on campus (computer classrooms, labs, library computers, etc.).\u00a0 Specifically,<\/p>\n<ol>\n<li>Computing facilities are provided mainly to allow students to work on academic assignments.\u00a0 Do not tie up computing resources for personal use when others need it for academic purposes.<\/li>\n<li>Please do not disturb a class that is in session. If computers are available, please proceed with your work quietly.<\/li>\n<li>If a class enters the facility in which you are working and requires your computer, please save your work and move to a different computing facility.<\/li>\n<li>Please do not eat near computing equipment; all drinks must have lids to avoid spills on computing equipment.<strong><br \/>\n<\/strong><\/li>\n<li>No alcohol, tobacco (including chewing tobacco) or illegal substances are allowed in computing facilities.<\/li>\n<li>Cell phone use is not permitted in the labs. Please set your phone to vibrate or turn it off to avoid distracting others.<\/li>\n<li>If you wear earphones, please adjust the volume so that only you can hear the sound.<\/li>\n<li>Please keep your work area clean. Pick up and dispose of trash and push in your chair when you leave.<\/li>\n<li>Printouts should be picked up promptly. Any printout left over two hours will be discarded.<\/li>\n<li>Report any computer or printer problems to the OIT Support Center (240-895-4357).<\/li>\n<li>Permission must be obtained from OIT Desktop Support Services\u00a0(240-895-4357) to install software or to alter the system configuration of computers in campus computing facilities.<\/li>\n<li>Computers and network ports are for college use only. The College does not provide ports for personal computer access in computing facilities.<\/li>\n<li>All individuals using campus computing facilities are governed by the College\u2019s general policy for 1.1 Appropriate Use of College IT Resources.<\/li>\n<\/ol>\n<p>Failure to comply with these regulations may result in a temporary or permanent loss of the privilege to use campus computing facilities.<\/p>\n<\/div>\n<h4>1.3 Online Access to Copyrighted Materials<\/h4>\n<div>\n<p>Downloading or distributing copyrighted material, e.g. documents, music, movies, videos, text, etc., without permission from the rightful owner violates the United States Copyright Act and the St. Mary\u2019s College of Maryland policy on 1.1 Appropriate Use of College IT Resources.\u00a0 Below is a summary discussion of: (a) legal options for accessing copyrighted material; (b) the possible civil and criminal penalties for violations of the United States Copyright Act; (c) the possible disciplinary measures imposed by the College for copyright violations; and (d) OIT measures taken against peer-to-peer file sharing applications in the wake of copyright violations involving use of such applications.<\/p>\n<h4 id=\"id-13OnlineAccesstoCopyrightedMaterials-ALegalOptionsforAccessingCopyrightedMaterials\u00a0\u00a0\">A. Legal Options for Accessing Copyrighted Materials<\/h4>\n<hr \/>\n<p>There are legal ways of obtaining copyrighted material such as music and movies for free.\u00a0 See the <a href=\"https:\/\/www.educause.edu\/focus-areas-and-initiatives\/policy-and-security\/educause-policy\/issues-and-positions\/intellectual-property\/legal-sources-onli\" target=\"_blank\" rel=\"nofollow noopener\">Legal Sources of Online Content<\/a> resource guide maintained by EDUCAUSE. Please take advantage of this resource instead of illegal peer-to-peer programs such as Limewire.<\/p>\n<p>Also legal are Library Electronic Course Reserves, articles and other digital materials accessed through licensed library databases, and postings of copyrighted materials within Blackboard. For additional information about applying accepted practices for fair use of copyrighted and other intellectual property please consult a SMCM librarian.<\/p>\n<p>&nbsp;<\/p>\n<h4 id=\"id-13OnlineAccesstoCopyrightedMaterials-BCivilCriminalPenaltiesforViolationofFederalCopyrightLaws\">B. Civil &amp; Criminal Penalties for Violation of Federal Copyright Laws<\/h4>\n<hr \/>\n<p>Individuals who obtain or distribute copyrighted material should be aware that if found liable for copyright infringement, the penalties can be severe, depending upon the amount and the willfulness of the infringing activity. In a civil lawsuit, one found liable for copyright infringement can be ordered to pay damages of as much as $30,000 per copyrighted work infringed. This penalty can be increased to $150,000 per infringed work in cases of particularly flagrant infringement. In the most serious and widespread cases of copyright infringement, criminal prosecution is possible.<\/p>\n<p>Additionally, students, faculty and staff who may be in violation of copyright law place not only themselves at risk; they may be exposing St. Mary\u2019s College of Maryland to liability as an institution, for contributory or vicarious infringement, e.g., using the Campus network resources to obtain the material and\/or to store the material on college computers and\/or servers.<\/p>\n<p>For more information, please see the Web site of the US Copyright Office at <a href=\"http:\/\/www.copyright.gov\/\" target=\"_blank\" rel=\"nofollow noopener\">www.copyright.gov<\/a>. The FAQ section may be of particular assistance at <a href=\"http:\/\/www.copyright.gov\/help\/faq\" target=\"_blank\" rel=\"nofollow noopener\">www.copyright.gov\/help\/faq<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h4 id=\"id-13OnlineAccesstoCopyrightedMaterials-CDisciplinaryConsequencesofAccessingCopyrightedMaterialsIllegally\">C. Disciplinary Consequences of Accessing Copyrighted Materials Illegally<\/h4>\n<hr \/>\n<h6 id=\"id-13OnlineAccesstoCopyrightedMaterials-\u00a0FirstRoundofViolations\">\u00a0First Round of Violations<\/h6>\n<ul>\n<li>OIT receives notice of violation(s).<\/li>\n<li>The offender\u00a0\u2013 either a student or an employee \u2014 is notified by OIT of the violation(s) and network access is suspended until the offender meets with an OIT representative.<\/li>\n<li>At this meeting, the violation(s) is(are) discussed; the offender receives copies of appropriate use policies governing online access to copyrighted materials; and the offender is asked to sign a notice of copyright violation.<\/li>\n<\/ul>\n<h6 id=\"id-13OnlineAccesstoCopyrightedMaterials-SubsequentViolations\">Subsequent Violations<\/h6>\n<ul>\n<li>OIT receives notice of violation(s).<\/li>\n<li>If the offender is a student:\u00a0 Both the student and the\u00a0Conduct Board are notified of the violation(s); and the student\u2019s network access is suspended until the\u00a0Conduct Board decides upon appropriate disciplinary measures and authorizes OIT to restore network access to the student .<\/li>\n<li>If the offender is a College employee:\u00a0 Both the employee and the Office of Human Resources are notified of the violation(s); and the employee\u2019s network access is suspended until the Office of Human Resources decides upon appropriate disciplinary measures and authorizes OIT to restore network access to the employee.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4 id=\"id-13OnlineAccesstoCopyrightedMaterials-\u00a0DUninstallingPeer-to-PeerApplicationsUsedtoAccessCopyrightedMaterialsIllegally\">\u00a0D. Uninstalling Peer-to-Peer Applications Used to Access Copyrighted Materials Illegally<\/h4>\n<hr \/>\n<p>If you have installed a peer-to-peer file sharing application on a computer that connects to the College network and are found using it for illegal activities, you will be required to uninstall the software in order to regain access to the network. The computer\u2019s operating system may need to be completely reinstalled in order to remove all traces of the file sharing software as well as any malicious software that was installed alongside the peer-to-peer software.<\/p>\n<p>Contact the OIT Support Center\u00a0(240-895-4357) for assistance with uninstalling peer-to-peer applications.<\/p>\n<\/div>\n<h5>1.4 Administrative Privileges on College-Owned Computers<\/h5>\n<div>\n<p>By default, all Faculty and Staff are provided standard user rights on their college assigned<br \/>\nPC\/Mac computer and rely on the IT Support Center for software installations and\/or system<br \/>\nmodifications. This is a security best practice consistent with the \u201cUSM Guidelines in Response to<br \/>\nthe State IT Security Policy\u201d. Restricting user level administrative rights can dramatically reduce<br \/>\nthe risk of malware infections. Malware on an infected machine will typically gain the same<br \/>\naccess rights as the logged in user account, and if that account has administrative rights, then the<br \/>\nmalware has the potential to do much more damage.<\/p>\n<h6>Administrative Access &amp; Responsibilities<\/h6>\n<p>Administrative rights are typically restricted to system and network administrators within the Office<br \/>\nof Information Technology. However, OIT recognizes that faculty and staff may occasionally need<br \/>\nelevated privileges on their SMCM owned computer. SMCM has purchased Admin By Request,<br \/>\nthis application will be available on all Faculty and Staff computers. Faculty &amp; Staff may request,<br \/>\nthrough this application, the ability to run an application that requires elevated privileges or if<br \/>\nnecessary an Administrative Session.<br \/>\nFaculty and staff who request administrative rights understand the responsibility of maintaining<br \/>\nappropriate security measures to protect SMCM computing resources and data.<br \/>\nUsers must NOT<br \/>\n\u25cf download and install software that is malicious to the SMCM network;<br \/>\n\u25cf download and install illegal or unlicensed software;<br \/>\n\u25cf download and install software not related to SMCM business;<br \/>\n\u25cf create additional user accounts;<br \/>\n\u25cf circumvent user access controls or any other security control instituted by the Office of<br \/>\nInformation Technology.<br \/>\nUsers who do not adhere to the administrative rights responsibilities will have their access to<br \/>\nAdmin By Request revoked.<\/p>\n<h6>Standard Operating Procedures<\/h6>\n<p>If the Office of Information Technology removes the ability to utilize Admin By Request due to a<br \/>\nviolation of this agreement, the user will submit a work order via the current ticketing system or<br \/>\nvia email to itsupport@smcm.edu and a member of Desktop Support Services will perform the<br \/>\nadmin function on behalf of the user.<\/p>\n<\/div>\n<h5>1.5 Tips for Effective Email Communication<\/h5>\n<div>\n<p>Here are some recommendations for insuring that your email messages are as effective as possible:<\/p>\n<ol>\n<li>Check spelling and grammar in your email messages.<\/li>\n<li>Always be courteous and thoughtful of others.\u00a0 Keep in mind that humorous (especially ironic) remarks in an email message can easily be misinterpreted.<\/li>\n<li>Always use a clear subject heading to assist recipients in dealing efficiently with your email message.<\/li>\n<li>Keep your email messages short. If possible, limit the message to the equivalent of a one-page document or shorter.\u00a0 For lengthier communications, put what you have to say in a document and attach it to a (brief) email message.\u00a0 Avoid the use of attachments, however, when sending email to \u201cAll\u201d lists (e.g., All Students).\u00a0 Attachments typically use more than 10 times as much storage space and bandwidth as the same text sent in the text window. When possible, refer recipients to web pages instead of attaching documents to a message.<\/li>\n<li>Avoid the embedding of graphic images in your email messages or attachments, especially when using \u201cAll\u201d lists, unless doing so is necessary to\u00a0convey information or attract attention to an important message.\u00a0Graphic images take up a great deal of space, typically more than the entire text of a message. Also avoid the use of images and animated sequences to spruce up email messages.<\/li>\n<li>Avoid spamming \u201cAll\u201d lists with email messages that are not of interest to the entire community.\u00a0 Construct your own lists of recipients whom you know are interested in receiving messages about specific topics, especially when the topic is probably not of interest to the entire community.<\/li>\n<li>Limit announcements of events to the 1\/1 rule (once well in advance of an event, and once more a day or so before the event).<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<h4>OIT Policy 2 \u2013 Acquiring and Replacing Computing Equipment<\/h4>\n<div class=\"accordion\">\n<h5>2.1 Acquiring and Replacing Computers<\/h5>\n<div>\n<div id=\"main-content\">\n<h4 id=\"id-21AcquiringandReplacingComputers-\u00a0AGeneralPolicies\">\u00a0A. General Policies<\/h4>\n<hr \/>\n<ol>\n<li>All computers, computer peripherals (e.g., monitors, keyboards), tablets, and other computing equipment purchased from College funds or from grants awarded under College sponsorship.are the property of the College under the stewardship of the Office of Information Technology (OIT).<\/li>\n<li>All purchases of computing equipment from College funds or from grants awarded under College sponsorship must be managed by, or coordinated with, OIT Desktop Support Services. This includes purchases of\u00a0office computers for use by full-time and part-time employees (including student workers) as well as research computers and computers that operate instruments.<\/li>\n<li>OIT will perform routine maintenance and performance tune-ups on all college-owned computers once each year, and at other intervals as needed.\u00a0 Emergency support is available at any time when needed. This policy includes computers purchased from College funds as well as from grants awarded under College sponsorship.<\/li>\n<li>OIT has the right to remove computing equipment from circulation if it is used for non-approved activities or if it becomes unsafe or uneconomical for the College to maintain in service.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4 id=\"id-21AcquiringandReplacingComputers-\u00a0BOfficeComputers\u00a0\">\u00a0B. Office Computers<\/h4>\n<hr \/>\n<ol>\n<li>OIT will pay for the original purchases and lifecycle replacements of the office computers assigned to full-time permanent employees (both faculty and staff).\u00a0 In most cases, (a) desktops will be replaced every six years, (b) laptops will be replaced every five years, and (c) monitors and other peripherals will be replaced as needed.\u00a0 This policy extends only to one machine per full-term permanent employee.\u00a0 An office or department is financially responsible for the original purchase and lifecycle replacement of all other office computers in its possession unless it has made an alternative arrangement with OIT.<\/li>\n<li>Office Computer Configurations provides a list of OIT-approved desktop and laptop selection options for ordering new and lifecycle replacement office computers.\u00a0 Because of the mobile nature of faculty work, academic departments are free to order either an OIT-approved desktop computer or an OIT-approved laptop computer for faculty offices.\u00a0 Staff employees are assigned an OIT-approved Windows desktop computer as their new or lifecycle replacement office computer unless an alternative arrangement has been made with OIT.<\/li>\n<li>There is no obligation to order a lifecycle replacement office machine that is of the same type and manufacture as the machine being replaced, apart from the previously-noted restriction that both the new and the lifecycle replacement computers assigned to staff employees are normally limited to Windows desktop machines.\u00a0 For example, a faculty employee who previously used a Dell desktop as her office computer can replace that machine with a MacBook Pro laptop.<\/li>\n<li>OIT will honor requests for upgrades in memory, storage, processing capability, monitor size, or some other hardware feature, provided that the requested upgrade has a work-related justification, is allowed under the warranty for the computer, and does not pose an unacceptable maintenance, repair, or support burden on OIT staff.\u00a0 Any additional costs associated with these upgrades must be paid for from office or departmental funds, faculty start-up funds, competitive grants, or some other supplemental funding source.\u00a0 This is true not only for upgrades to original machines, but also for upgrades to life-cycle replacement computers.<\/li>\n<li>OIT will honor requests to install software not included in the standard software package installed on new and lifecycle replacement computers, provided that the requested installation has a work-related justification, is compatible with the computer\u2019s operating system and performance capabilities, and does not pose an unacceptable maintenance, repair, or support\u00a0 burden on OIT staff.\u00a0 Any additional costs associated with these installations must be paid for from office or departmental funds, faculty start-up funds, competitive grants, or some other supplemental funding source.\u00a0 OIT will require proof of a valid license for all software not purchased through OIT before installing or re-installing the software on any college-owned computer.<\/li>\n<li>OIT will honor requests to replace a functioning office computer with a new computer before the old computer is scheduled for lifecycle replacement, provided that a work-related justification can be given for the request.\u00a0 In most cases OIT will expect the office or department possessing the computer to cover all premature costs associated with the purchase.<sup>1<\/sup><\/li>\n<li>OIT will make every effort to replace the office computer assigned to a full-time permanent employee with a new or used machine of the same make and model if the computer is stolen, malfunctions, breaks down entirely, or becomes unsafe or uneconomical for the College to maintain in service.\u00a0 The same holds for lost, stolen, or malfunctioning computer parts, monitors, power supplies, or other peripherals. However, OIT retains the right to charge the employee\u2019s office or department for some or all of the costs associated with the replacement of a full-time employee\u2019s computing equipment if the equipment was lost, stolen, or rendered inoperable because of misuse or negligence on the part of the employee or others working in the office or department.\u00a0 An office or department is always responsible for all costs incurred in replacing lost, stolen, or malfunctioning office computing equipment that is not assigned to a full-time permanent employee, also research computers and computers that operate instruments.<\/li>\n<li>All computers assigned to a permanent full-time employee (faculty or staff) must be returned to OIT upon termination of this person\u2019s permanent employment in that office or department unless the former employee\u2019s office or department head has made an alternative arrangement with OIT.\u00a0 (This policy applies regardless of whether the person stays on as a contractual employee, is transferring to another office or department at the College, or is leaving the College entirely.)\u00a0 This return of equipment is necessary to allow for streamlined equipment maintenance, software updates, customizations requested by the next user, and the removal of equipment from circulation when it is no longer serviceable.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4 id=\"id-21AcquiringandReplacingComputers-CResearchandInstrumentationComputers\">C. Research and Instrumentation Computers<\/h4>\n<hr \/>\n<ol>\n<li>An office or department, or an individual faculty member with available grant or start-up funds,\u00a0is financially responsible for the original purchase and\u00a0replacement of all research and instrumentation computers unless an alternative arrangement with OIT has been made.<\/li>\n<li>OIT will work with the office, department, or individual faculty member to purchase hardware and software that is appropriate for the research activity or instrumentation in question.<\/li>\n<\/ol>\n<p>Please contact the IT Support Center\u00a0(240-895-4357) for all equipment-related requests described in this document.<\/p>\n<p>NOTES<\/p>\n<ol>\n<li>Suppose, for example, that OIT agrees to replace a faculty member\u2019s Dell laptop, purchased two years ago, with a new iMac desktop that costs $1,500, or $375 for each year of the new machine\u2019s four-year lifespan. Since this purchase is taking place two years before the end of the old machine\u2019s four-year lifespan,\u00a0 the faculty member would normally be expected to secure $750 ( = $375 per year X 2 years)\u00a0 in departmental or other supplemental funds to contribute toward the purchase.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<h5>2.2 Lending Out-of-Lifecycle Computers<\/h5>\n<div>\n<div id=\"main-content\">\n<ol>\n<li>OIT provides a desktop or laptop computer to every full-time permanent employee of the College who requires computing equipment to perform his or her job duties.<\/li>\n<li>OIT replaces these computers with new machines every five to six years.<\/li>\n<li>When an office or department has a need for additional computing equipment beyond that provided by OIT to its full-time permanent employees, OIT strongly advises the unit to purchase this equipment new and to replace it every five to six years.<\/li>\n<li>When, however, it is not financially feasible for an office or department to purchase new computing equipment for its needs, OIT will lend retired (out-of-lifecycle) computing equipment to the unit when such equipment is available.<\/li>\n<li>Out-of-lifecycle equipment lent by OIT to offices or departments will usually come installed with the standard software package provided by OIT when the equipment was in-lifecycle.\u00a0 OIT will not be able to provide version upgrades to the standard software (including operating system software) that it installs on the out-of-lifecycle equipment it lends to offices or departments, in part because out-of-lifecycle equipment typically cannot support the newer versions of software that are installed on newer, in-lifecycle equipment.<\/li>\n<li>Requests by offices or departments for OIT to install additional, non-standard software on borrowed out-of-lifecycle equipment will be evaluated on a case-by-case basis.\u00a0 Any additional licensing costs associated with the request must be borne by the office or department.\u00a0 OIT will require proof of a valid license for all software not purchased through OIT before installing or re-installing the software on any college-owned computer.<\/li>\n<li>OIT will provide the same level of user support for borrowed out-of-lifecycle computing equipment that it provides for college-owned in-lifecycle computing equipment.\u00a0 (Users of in-lifecycle and of out-of-lifecycle equipment alike will receive assistance with network access, password management, use of software applications, etc.)<\/li>\n<li>OIT may not be able to provide the same level of equipment support for borrowed out-of-lifecycle equipment that it provides for newer, in-lifecycle equipment.\u00a0\u00a0OIT will perform routine maintenance and performance tune-ups on all office computers, including out-of-lifecycle machines, once each year, and at other intervals as needed. However, OIT will not be able to make either: (a) extensive repairs to malfunctioning out-of-lifecycle equipment; or (b) extensive hardware or software modifications designed to improve the performance of out-of-lifecycle equipment.<\/li>\n<li>OIT has the right to remove borrowed out-of-lifecycle computing equipment from circulation if it is used for non-approved activities or if it becomes unsafe or uneconomical for the College to maintain in service.<\/li>\n<li>OIT will make every effort, but may not be able, to replace borrowed out-of-lifecycle computing equipment with other out-of-lifecycle equipment if the borrowed equipment is stolen, malfunctions, breaks down entirely, or becomes unsafe or uneconomical for the College to maintain in service.\u00a0 The same holds for lost, stolen, or malfunctioning computer parts, monitors, power supplies, or other peripherals. However, OIT retains the right to refuse requests for out-of-lifecycle computing equipment replacements if the original equipment was lost, stolen, or rendered inoperable because of misuse or negligence on the part of faculty, staff, and\/or students who use the equipment.<\/li>\n<li>Please contact the IT Support Center\u00a0(240-895-4357) for all equipment-related requests described in this document.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<h5>2.3 Lending Laptops to Faculty on Sabbatical<\/h5>\n<div>\n<div id=\"main-content\">\n<ol>\n<li>OIT will lend a new or used laptop computer to a faculty member on sabbatical if: (a) the faculty member elects to relinquish her\/his office computer to her\/his replacement; and (b) the faculty member or her\/his department doesn\u2019t possess other college-owned computing equipment that the faculty member can use in her\/his sabbatical research or scholarship.<\/li>\n<li>Depending on availability, the faculty member may choose either an OIT-approved Windows laptop or an OIT-approved Apple laptop as his or her borrowed equipment.\u00a0 The <a title=\"Office Computer Configurations\" href=\"https:\/\/docs.google.com\/document\/d\/13q9yitO6NJkFgj0RvbCIZwBrKieYynFSLJTRZFoseBY\/edit#heading=h.iwkhu5w0gtqc\" target=\"_blank\" rel=\"noopener\">Office Computer Configurations<\/a> page provides a description of these two laptop options.<\/li>\n<li>The borrowed computer will come equipped with the College\u2019s standard software package.\u00a0 OIT will honor requests to procure and install additional software provided that the requested installation has a work-related justification, is compatible with the computer\u2019s operating system and performance capabilities, and does not pose an unacceptable maintenance, repair, or support\u00a0 burden on OIT staff.\u00a0 OIT will expect the faculty member to secure departmental or other supplementary funds to cover any additional licensing costs for the requested software.\u00a0 OIT will require proof of\u00a0 a valid license for all software not purchased through OIT before installing the software on any college-owned computer.<\/li>\n<li>Any equipment lent to the faculty member remains the property of OIT throughout the loan period; and it must be returned to OIT on or soon after the last day of the faculty member\u2019s sabbatical unless the faculty member has negotiated an alternative arrangement with OIT.<\/li>\n<li>A faculty member who desires to borrow a laptop from OIT under this policy should contact the IT Support Center\u00a0(240-895-4357) as soon as possible after learning that she\/he has been approved for sabbatical.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<h5>2.4 Lending Laptops to Visiting Faculty<\/h5>\n<div>\n<ol>\n<li>OIT will lend a new or used laptop computer to <em><strong>full-time visiting faculty<\/strong><\/em> (including sabbatical replacements) whenever existing serviceable equipment adequate for the faculty member\u2019s teaching duties is not already available to the faculty member.<\/li>\n<li>Subject to availability, OIT will lend a used laptop computer to <em><strong>part-time visiting faculty<\/strong><\/em> whenever: (a) the faculty member requires a college-owned computer to perform her\/his teaching duties adequately; and (b) existing serviceable computing equipment adequate for the faculty member\u2019s teaching duties is not already available to the faculty member.<\/li>\n<li>Depending on availability, the faculty member may choose either an OIT-approved Windows laptop or an OIT-approved Apple laptop as his or her borrowed equipment.\u00a0 The <a title=\"Office Computer Configurations\" href=\"https:\/\/docs.google.com\/document\/d\/13q9yitO6NJkFgj0RvbCIZwBrKieYynFSLJTRZFoseBY\/edit#heading=h.iwkhu5w0gtqc\" target=\"_blank\" rel=\"noopener\">Office Computer Configurations<\/a> page provides a description of these two laptop options.<\/li>\n<li>The borrowed computer will come equipped with the College\u2019s standard software package.\u00a0 OIT will honor requests to procure and install additional software provided that the requested installation has a work-related justification, is compatible with the computer\u2019s operating system and performance capabilities, and does not pose an unacceptable maintenance, repair, or support\u00a0 burden on OIT staff.\u00a0 In most cases OIT will expect the faculty member to secure departmental or other supplementary funds to cover any additional licensing costs for the requested software.\u00a0 OIT will require proof of\u00a0 a valid license for all software not purchased through OIT before installing the software on any college-owned computer.<\/li>\n<li>Any equipment lent to the faculty member remains the property of OIT throughout the loan period; and it must be returned to OIT on or soon after the last day of employment stated in the faculty member\u2019s contract unless the faculty member\u2019s department has negotiated an alternative arrangement with OIT.<sup>1<\/sup>\u00a0 This return of equipment is necessary to allow for streamlined equipment maintenance, software updates, customizations requested by the next user, and the removal of equipment from circulation when it is no longer serviceable.<\/li>\n<li>At the time of hire, the faculty member and her\/his department chair will receive an email message from OIT providing specific information about how to borrow equipment from OIT.\u00a0 Contact the IT Support Center\u00a0(240-895-4357) if you have any questions.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<h4>OIT Policy 3 \u2013 Security Requirements for Network Passwords<\/h4>\n<div class=\"accordion\">\n<h5>Security Requirements for Network Passwords<\/h5>\n<div>\n<div id=\"main-content\">\n<ol>\n<li>To protect network security and the confidentiality of information, passwords to College network accounts are set to expire every 365 days.\u00a0 Users must change to a new password before then to avoid being locked out of their accounts.<\/li>\n<li>Password Manager, the College\u2019s self-service password reset program, allows registered users the opportunity to reset their password before and after the 365-day deadline (thereby unlocking their account in the latter case).\u00a0 Users may also visit or phone the IT Support Center for assistance in unlocking accounts and resetting passwords.\u00a0 After establishing the identity of the user, qualified staff will assign a temporary password that users are instructed to reset with a new password at their next log-in.<\/li>\n<li>All passwords are restricted to a minimum of 8 characters and have to contain at least three of the following: (a) uppercase letters; (b) lowercase letters; (c) numbers; and (d) special characters (<em>?.#,@,!).<\/em><\/li>\n<li>Passwords may not consist of the user&#8217;s name.<\/li>\n<li>Passwords may not contain any of the user&#8217;s security question answers.<\/li>\n<li>Passwords are never stored in clear text.<\/li>\n<li>Password reuse is discouraged by not allowing the last 24 passwords to be reused.<\/li>\n<li>User accounts are locked for 240 minutes after 15 consecutive failed log-in attempts.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<h4>OIT Policy 4 \u2013 One Card Policy<\/h4>\n<div class=\"accordion\">\n<h5>One Card Policy<\/h5>\n<p><strong>PURPOSE<\/strong><br \/>\nThe purpose of this policy is to outline a process for issuing One Cards to Faculty, Staff and Students for the purpose of Identification and granting access to areas that are controlled through electronic cards readers. This will ensure the protection of SMCM personnel and property through proper documentation and tracking.<\/p>\n<p><strong>SCOPE<\/strong><br \/>\nThis policy applies to all Students, Faculty, Staff and Retirees.<\/p>\n<p><strong>TYPES OF ONECARDS<\/strong><br \/>\nStudent ID: Issued to students registered for courses at St. Mary\u2019s College of Maryland<br \/>\nFaculty \u2013 Issued to all Faculty employed by St. Mary&#8217;s College of Maryland (Full Time, Part Time,<br \/>\nEmeritus)<br \/>\nStaff \u2013 Issued to all Staff employed by St. Mary\u2019s College of Maryland (Full Time, Part Time,)<br \/>\nPublic Safety \u2013 Special cards are printing for Officers in Public Safety, these cards will contain the seal<br \/>\nand indicate their positions within Public Safety (Officer, Staff, Sargent, Chief and Asst. Director)<br \/>\nRetiree \u2013 Issued to Faculty or Staff that have officially retired from St. Mary\u2019s College of Maryland. The<br \/>\nOne Card will indicate if the applicant has been granted Emeritus Status.<\/p>\n<p><strong>ISSUANCE<\/strong><br \/>\nOne Cards are issued through the Office of Information Technology. The ID card is to show the full face<br \/>\nof the applicant without hats or dark glasses. Head coverings may be permitted due to religious beliefs<br \/>\nprovided the head covering does not obscure the face in any way.<br \/>\nStudent\u2019s ID pictures are taken during New Student Days or uploaded through the CBord GET application<br \/>\nand are issued during their check in through the Office of Residence Life.<br \/>\nOne Cards will contain the applicant\u2019s legal name unless approved by the Title IX office. In the case of a<br \/>\nchosen name, the Title IX office will submit a work order through the Office of Information Technology<br \/>\nonce approved and a new card will be issued with the chosen name at no cost.<br \/>\nThe initial One Card will be issued without a fee. In the case of a lost or stolen card, the applicant should<br \/>\ndeactivate the card through the GET app to prevent unauthorized usage. Once a card has been<br \/>\nreplaced, the old card will automatically cease to work and cannot be reactivated.<\/p>\n<p>You must not damage or alter your OneCard in any manner. This includes, but is not limited to, punching<br \/>\nholes in your card.<\/p>\n<p>Your OneCard is issued by the Office of Information Technology for Official Use only, any attempt to<br \/>\nduplicate or copy the OneCard is prohibited and will be reported to the Office of Public safety for further<br \/>\naction.<br \/>\nThe following fees will apply for replacement cards:<br \/>\nLost Card &#8211; $25<br \/>\nDamaged Card &#8211; $25<br \/>\nDemagnetized &#8211; $0<br \/>\nFaded or Warn &#8211; $0<br \/>\nStolen &#8211; $0 (must have a written report from Public Safety)<\/p>\n<p><strong>FACILITY USE<\/strong><br \/>\nThe Campus One Card will be coded to allow access to the applicants Office Building or Housing. Each<br \/>\ncard will also allow access to the appropriate Athletic and Recreation center locker room. Requests for<br \/>\nadditional access must be submitted through the work order system by the applicant\u2019s supervisor or<br \/>\nauthorized approving authority. Access assigned to Faculty and Staff OneCards will remain until a<br \/>\nrequest to remove is received or employment is ended.<\/p>\n<p><strong>LIBRARY<\/strong><br \/>\nThe applicant\u2019s one card can be used in the St. Mary&#8217;s College of Maryland Library to check out books or<br \/>\nother items available through the Library.<\/p>\n<p><strong>MEAL PLANS<\/strong><br \/>\nThe applicant\u2019s meal plan will be loaded onto the card at the beginning of each semester or within 24<br \/>\nhours of purchase.<\/p>\n<p><strong>PAY FOR PRINT<\/strong><br \/>\nAt the beginning of each semester a $30 credit will be applied to students One Card for printing. Once<br \/>\nthis credit has been depleted, the student can loan additional funds through the Portal. Any remaining<br \/>\nbalance at the end of the semester is forfeited and cannot be carried over.<\/p>\n<p><strong>SURRENDER OF CARD<\/strong><br \/>\nThe St. Mary&#8217;s College of Maryland One Card will be surrendered to the Office of Human Recourses<br \/>\nduring the checkout process. The one card will automatically deactivate in CSGold once the applicant\u2019s<br \/>\nstatus has been updated in Enterprise System. Should the applicant have the status of Retiree or<br \/>\nEmeritus, the applicant will be supplied a new card at no cost.<\/p>\n<p>Student Access Permissions:<br \/>\nAll requests for student access will be submitted in the form of a work order through<br \/>\n<a href=\"https:\/\/servicedesk.smcm.edu\">https:\/\/servicedesk.smcm.edu<\/a> and must be submitted by the Building Manager or their designee. To<br \/>\nappoint a designee, the building manager should submit a work order via <a href=\"https:\/\/servicedesk.smcm.edu\">https:\/\/servicedesk.smcm.edu<\/a>.<\/p>\n<p>Access added to Students OneCards will be removed at the end of the Spring Semester, should access<br \/>\nneed to continue through the summer, a new request will need to be submitted.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>New &amp; Recently Updated EPEAT, Electronic Product Environmental Assessment Tool, Policy (PDF) Email Policy 2018 (PDF) Administrative Rights Policy (PDF) One Card Policy Maryland Department of Information Technology Security Manual\u00a0 National Institute of Standards and Technology\u00a0 SANS Institute Cybersecurity Training Open Web Application Security Project Center for Internet Security Anthology Product Security Lab Software Deployment<a class=\"tribe-events-read-more\" href=\"https:\/\/www.smcm.edu\/it\/policies\/\" rel=\"bookmark\" > Find out more &raquo;<\/a><\/p>\n","protected":false},"author":199,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-4728","1":"page","2":"type-page","3":"status-publish","5":"entry"},"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/pages\/4728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/users\/199"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/comments?post=4728"}],"version-history":[{"count":8,"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/pages\/4728\/revisions"}],"predecessor-version":[{"id":5365,"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/pages\/4728\/revisions\/5365"}],"wp:attachment":[{"href":"https:\/\/www.smcm.edu\/it\/wp-json\/wp\/v2\/media?parent=4728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}