Document search
Results
Electronic information security policy - user policy
This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.
Third-party privileged access policy?
This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.
Electronic information security policy - monitoring and logging policy
This subsidiary policy covers the monitoring and logging of all uses of information technology.
Password policy
This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.
Electronic information security policy
This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.
Access control policy
This policy details how each user’s access privileges shall be authorised according to business needs.