Search results

Document search


Results

867 results found

Adverse Events in Research Reporting Procedure

The purpose of this document is to describe the procedure for identifying, recording and reporting adverse events (AEs) and urgent safety measures (USMs) occurring in research projects that are sponsored by the University.

Research, innovation and enterprise > Research
PDF 395KB
Procedure

Concordat Action Plan 2012-2014

The Concordat to Support the Career Development of Researchers Action Plan 2012-14 sets out the expectations and responsibilities of researchers, their managers, employers and funders.

Research, innovation and enterprise > Research
PDF 355KB
Plan

Export Control Policy

In the academic context, export controls are most likely to apply in relation to scientific and technical research with military, nuclear, chemical, biological, missile and aerospace applications. This policy applies to all employed to conduct research and innovation activities at the University.

Research, innovation and enterprise > Research
PDF 193KB
Policy

Concordat Action Plan 2010-2012

The Concordat to Support the Career Development of Researchers Action Plan 2010-12 sets out the expectations and responsibilities of researchers, their managers, employers and funders.

Research, innovation and enterprise > Research
PDF 253KB
Plan

REF2021 Code of Practice

The University is required to ensure that Research Excellence Framework (REF) procedures do not discriminate unlawfully against, or otherwise have the effect of harassing or victimising individuals from protected characteristics. This is Edinburgh Napier�s REF 2021 Code of Practice.

Research, innovation and enterprise > Research
PDF 6MB
Policy

Vulnerability Management Policy

This policy has been introduced by the Cyber Security Oversight Group to help manage security vulnerabilities.

Information technology > Information security
Last reviewed 9 June 2025
PDF 202KB
Policy

Electronic information security policy - user policy

This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.

Information technology > Information security
Last reviewed 7 March 2025
PDF 111KB
Policy

Third-party privileged access policy

This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.

Information technology > Information security
Last reviewed 11 March 2024
PDF 152KB
Policy

Electronic information security policy - monitoring and logging policy

This subsidiary policy covers the monitoring and logging of all uses of information technology.

Information technology > Information security
Last reviewed 7 March 2025
PDF 128KB
Policy

Password policy

This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.

Information technology > Information security
PDF 154KB
Policy