Document search
Results
Adverse Events in Research Reporting Procedure
The purpose of this document is to describe the procedure for identifying, recording and reporting adverse events (AEs) and urgent safety measures (USMs) occurring in research projects that are sponsored by the University.
Concordat Action Plan 2012-2014
The Concordat to Support the Career Development of Researchers Action Plan 2012-14 sets out the expectations and responsibilities of researchers, their managers, employers and funders.
Export Control Policy
In the academic context, export controls are most likely to apply in relation to scientific and technical research with military, nuclear, chemical, biological, missile and aerospace applications. This policy applies to all employed to conduct research and innovation activities at the University.
Concordat Action Plan 2010-2012
The Concordat to Support the Career Development of Researchers Action Plan 2010-12 sets out the expectations and responsibilities of researchers, their managers, employers and funders.
REF2021 Code of Practice
The University is required to ensure that Research Excellence Framework (REF) procedures do not discriminate unlawfully against, or otherwise have the effect of harassing or victimising individuals from protected characteristics. This is Edinburgh Napier�s REF 2021 Code of Practice.
Vulnerability Management Policy
This policy has been introduced by the Cyber Security Oversight Group to help manage security vulnerabilities.
Electronic information security policy - user policy
This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.
Third-party privileged access policy
This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.
Electronic information security policy - monitoring and logging policy
This subsidiary policy covers the monitoring and logging of all uses of information technology.
Password policy
This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.