Search results

Document search


Results

867 results found

Adverse Events in Research Reporting Procedure

The purpose of this document is to describe the procedure for identifying, recording and reporting adverse events (AEs) and urgent safety measures (USMs) occurring in research projects that are sponsored by the University.

Research, innovation and enterprise > Research
PDF 395KB
Procedure

Concordat Action Plan 2012-2014

The Concordat to Support the Career Development of Researchers Action Plan 2012-14 sets out the expectations and responsibilities of researchers, their managers, employers and funders.

Research, innovation and enterprise > Research
PDF 355KB
Plan

Export Control Policy

In the academic context, export controls are most likely to apply in relation to scientific and technical research with military, nuclear, chemical, biological, missile and aerospace applications. This policy applies to all employed to conduct research and innovation activities at the University.

Research, innovation and enterprise > Research
PDF 193KB
Policy

Concordat Action Plan 2010-2012

The Concordat to Support the Career Development of Researchers Action Plan 2010-12 sets out the expectations and responsibilities of researchers, their managers, employers and funders.

Research, innovation and enterprise > Research
PDF 253KB
Plan

REF2021 Code of Practice

The University is required to ensure that Research Excellence Framework (REF) procedures do not discriminate unlawfully against, or otherwise have the effect of harassing or victimising individuals from protected characteristics. This is Edinburgh Napier�s REF 2021 Code of Practice.

Research, innovation and enterprise > Research
PDF 6MB
Policy

Vulnerability Management Policy

This policy has been introduced by the Cyber Security Oversight Group to help manage security vulnerabilities.

Information technology > Information security
Last reviewed 9 June 2025
PDF 202KB
Policy

Electronic information security policy - user policy

This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.

Information technology > Information security
Last reviewed 7 March 2025
PDF 111KB
Policy

Third-party privileged access policy

This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.

Information technology > Information security
Last reviewed 11 March 2024
PDF 152KB
Policy

Electronic information security policy - monitoring and logging policy

This subsidiary policy covers the monitoring and logging of all uses of information technology.

Information technology > Information security
Last reviewed 7 March 2025
PDF 128KB
Policy

Password policy

This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.

Information technology > Information security
PDF 154KB
Policy

Mobile computing policy

This policy details how to ensure safe mobile working and ease of use and with the capability to connect and access resources such as email, online storage, and University business systems and data sources.

Information technology > Information security
Last reviewed 7 March 2025
PDF 150KB
Policy

Electronic information security policy

This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.

Information technology > Information security
Last reviewed 2 October 2024
PDF 167KB
Policy

Access control policy

This policy details how each user’s access privileges shall be authorised according to business needs.

Information technology > Information security
PDF 169KB
Policy

Bring your own device policy

This policy is intended to address the use in the workplace by staff and students of non-University owned electronic devices such as smart phones, tablets and other such devices to access and store University information, as well as their own.

Information technology > Devices and IT equipment
PDF 170KB
Policy

Print to a multi-function device (MFD) from a personal iPhone or iPad

This guide explains how to print to a MFD from a personal iPhone or iPad.

Information technology > Devices and IT equipment
PDF 640KB
Procedure

Print to a multi-function device (MFD) from a personal Android device

This guide explains how to print to a MFD from a personal Android device.

Information technology > Devices and IT equipment
PDF 90KB
Procedure

Multi-Factor Authentication (MFA) - QR Code setup guide

This guide explains how to set up MFA for staff and students.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 756KB
Procedure

Print to a multi-function device (MFD) from a personal Apple MacBook

This guide explains how to print to a MFD from a personal Apple MacBook.

Information technology > Devices and IT equipment
PDF 635KB
Procedure

Print to a multi-function device (MFD) from a personal Microsoft Windows laptop

This guide explains how to print to a MFD from a personal Windows laptop.

Information technology > Devices and IT equipment
PDF 160KB
Procedure

Your University laptop - guidance for overseas colleagues

How to use a University laptop for colleagues based overseas.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 464KB
Guidance