Document search

14 results found for !nullquery
  1. Records Management Policy

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-records-management/records-management-policy.pdf

    To provide direction on how University records are to be managed to preserve their value.…

  2. Requests for personal data by the Police or a similar third party for the purposes of the prevention or detection of crime, apprehension or prosecution of offenders, or for taxation

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-data-protection-sharing-personal-data-with-third-parties/release-of-personal-data-for-crime-prevention.pdf
  3. Access to information during periods of staff absence

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/access-to-information-during-periods-of-absence.pdf

    This Policy defines the circumstances under which access to information held in email and files can be made during periods of absence, for business continuity purposes.…

  4. Data governance policy

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-data-governance/data-governance-policy.pdf

    The purpose of this policy is to describe the University’s approach to data governance in terms of data availability, data accessibility and data quality and to outline how clear accountability for each is managed.…

  5. University privacy notice: Postgraduate research students

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-data-protection-privacy-information/postgraduate_research_students_privacy_notice.pdf

    To advise people how their personal data are used by the University.…

  6. University Privacy notice: collection and use of employee personal data

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-data-protection-privacy-information/staff_privacy_notice.pdf

    To advise people how their personal data are used by the University…

  7. Supplier remote access requirements

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/supplier-remote-access-requirements.pdf

    Managing secure access to internal systems by third parties…

  8. Maintaining the security of credit & debit card data - policy

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/maintaining-the-security-of-credit-&-debit-card-data----policy.pdf

    Policy to cover PCI-DSS compliance (credit / debit cards)…

  9. Best practice for device connectivity

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/best-practice-device-connectivity.pdf

    Document outlining the best practice for securing devices connecting to the University network…

  10. Electronic data destruction and media disposal policy

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/data-destruction-policy.pdf

    This policy covers the destruction of electronic media that stores or has stored, University-owned data as defined within the Information Classification Policy…

  11. University cyber incident and data breach management procedure

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/university-cyber-incident-and-data-breach-management-procedure.pdf

    Protocol for managing suspected cyber/personal data breach…

  12. Travelling with technology

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/travelling-with-technology.pdf

    Guidance for securing technology whilst travelling…

  13. Cyber risk levels

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/cyber-risk-levels.pdf

    Define the cyber risk levels that are used to describe vulnerabilities.…

  14. Vulnerability testing process

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/vulnerability-testing.pdf

    Guidance on when and how systems should be tested for security vulnerabilties…