Document search
Results
Vulnerability Management Policy
This policy has been introduced by the Cyber Security Oversight Group to help manage security vulnerabilities.
Electronic information security policy - monitoring and logging policy
This subsidiary policy covers the monitoring and logging of all uses of information technology.
Password policy
This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.
Electronic information security policy
This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.
Mobile computing policy
This policy details how to ensure safe mobile working and ease of use and with the capability to connect and access resources such as email, online storage, and University business systems and data sources.
Access control policy
This policy details how each user’s access privileges shall be authorised according to business needs.
Bring your own device policy
This policy is intended to address the use in the workplace by staff and students of non-University owned electronic devices such as smart phones, tablets and other such devices to access and store University information, as well as their own.
Bribery Act 2010 - University Policy Statement
The University's policy statement on the Bribery Act 2010.
Statement of Principal Accounting Policies
The University's statement of principal accounting policies.
Treasury Management Policy and Procedure
The University's Treasury Management Policy and Procedure states the objectives for treasury management activities and the processes to be used to manage activities to achieve these objectives.