Search results

Document search


Results

6 results found

Electronic information security policy - user policy

This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.

Information technology > Information security
PDF 107KB
Policy

Third-party privileged access policy?

This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.

Information technology > Information security
PDF 152KB
Policy

Electronic information security policy - monitoring and logging policy

This subsidiary policy covers the monitoring and logging of all uses of information technology.

Information technology > Information security
PDF 128KB
Policy

Password policy

This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.

Information technology > Information security
PDF 154KB
Policy

Electronic information security policy

This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.

Information technology > Information security
Last reviewed October 3, 2024
PDF 165KB
Policy

Access control policy

This policy details how each user’s access privileges shall be authorised according to business needs.

Information technology > Information security
PDF 169KB
Policy