Information Security Policies and Procedures
Information Security Policies and Procedures
- University IT Regulations
- Password Policy - for creating strong passwords
- Network Connection Policy - for connecting systems to the campus network
- Server Management Policy - for the configuration and management of servers
- Patch and Vulnerability Management Policy - for applying security updates and addressing vulnerabilities
- Guidelines for System and Network administrators - roles and responsibilities
- IT Monitoring Policy - for network and systems monitoring
- Information Security Incident Handling Policy - for handling IT security incidents and breaches of information security policies
- Guidelines for Handling Confidential Data
- Information Risk Classifications
- Mobile Device Encryption Policy
- Cloud Policy
- Extraordinary Circumstances IT Access Policy
- IT Equipment Disposal Policy
- Wireless Local Area Network Policy - for deployment, administration and support of wireless LANs
- Universal Access Policy - for the provision of Universal access to information resources
- Blocking of Network Access - Guidelines and Procedures
- Spam Email Policy and procedures
- Peer to Peer (P2P)