
security.georgetown.edu/technology-policies2
Preview meta tags from the security.georgetown.edu website.
Linked Hostnames
7- 34 links tosecurity.georgetown.edu
- 3 links towww.georgetown.edu
- 1 link toaccessibility.georgetown.edu
- 1 link tocompliance.georgetown.edu
- 1 link toideaa.georgetown.edu
- 1 link tomaps.georgetown.edu
- 1 link tosearch.georgetown.edu
Thumbnail

Search Engine Appearance
Technology Policies - University Information Security Office
The Georgetown University Information Security policies, supporting guidelines, and associated procedures have all been designed to adhere to the NIST Cyber Security Framework and its related Special Publications. UIS is charged with providing the tools and controls necessary to best ensure the confidentiality, integrity, availability, privacy and security of the University and all its assets […]
Bing
Technology Policies - University Information Security Office
The Georgetown University Information Security policies, supporting guidelines, and associated procedures have all been designed to adhere to the NIST Cyber Security Framework and its related Special Publications. UIS is charged with providing the tools and controls necessary to best ensure the confidentiality, integrity, availability, privacy and security of the University and all its assets […]
DuckDuckGo

Technology Policies - University Information Security Office
The Georgetown University Information Security policies, supporting guidelines, and associated procedures have all been designed to adhere to the NIST Cyber Security Framework and its related Special Publications. UIS is charged with providing the tools and controls necessary to best ensure the confidentiality, integrity, availability, privacy and security of the University and all its assets […]
General Meta Tags
7- titleTechnology Policies | University Information Security Office | Georgetown University
- charsetUTF-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
Open Graph Meta Tags
7og:locale
en_US- og:typearticle
- og:titleTechnology Policies - University Information Security Office
- og:descriptionThe Georgetown University Information Security policies, supporting guidelines, and associated procedures have all been designed to adhere to the NIST Cyber Security Framework and its related Special Publications. UIS is charged with providing the tools and controls necessary to best ensure the confidentiality, integrity, availability, privacy and security of the University and all its assets […]
- og:urlhttps://security.georgetown.edu/technology-policies2/
Twitter Meta Tags
3- twitter:cardsummary_large_image
- twitter:label1Est. reading time
- twitter:data11 minute
Link Tags
23- EditURIhttps://security.georgetown.edu/xmlrpc.php?rsd
- alternatehttps://security.georgetown.edu/wp-json/wp/v2/pages/127
- alternatehttps://security.georgetown.edu/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fsecurity.georgetown.edu%2Ftechnology-policies2%2F
- alternatehttps://security.georgetown.edu/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fsecurity.georgetown.edu%2Ftechnology-policies2%2F&format=xml
- apple-touch-iconhttps://security.georgetown.edu/wp-content/themes/wp-theme-whnu/images/icons/apple-touch-icon.png
Links
42- http://maps.georgetown.edu
- http://www.georgetown.edu
- https://accessibility.georgetown.edu
- https://compliance.georgetown.edu/hipaa/sections/privacy#_ga=2.18755322.2122225557.1563793298-1642093002.1563663517
- https://ideaa.georgetown.edu/notice-of-non-discrimination