{"version":"1.0","provider_name":"Policy Administration Office","provider_url":"https:\/\/wp.uthscsa.edu\/pao","title":"Chapter 5 - Information Technology - Policy Administration Office","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2rfk6zsmBP\"><a href=\"https:\/\/wp.uthscsa.edu\/pao\/hop\/5-toc\/\">Chapter 5 &#8211; Information Technology<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/wp.uthscsa.edu\/pao\/hop\/5-toc\/embed\/#?secret=2rfk6zsmBP\" width=\"600\" height=\"338\" title=\"&#8220;Chapter 5 &#8211; Information Technology&#8221; &#8212; Policy Administration Office\" data-secret=\"2rfk6zsmBP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/wp.uthscsa.edu\/pao\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;] 5.1 INFORMATION TECHNOLOGY 5.1.2 IT Accessibility 5.2 INFRASTRUCTURE SOLUTIONS 5.2.1 Mission 5.2.2 Organization and Services 5.2.3 Infrastructure Solutions Request 5.2.4 Network Infrastructure Administration 5.2.5 Protection of Information Resources 5.2.6 Electronic Mail Use and Retention 5.2.7 Using Electronic Communications for Broadcast E-Mail Notifications and Distribution of Information 5.2.8 Internet Use 5.2.9 Acquisition of [&hellip;]"}