Document search

12 results found for !nullquery
  1. Travelling with technology

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/travelling-with-technology.pdf

    Guidance for securing technology whilst travelling…

  2. Cyber risk levels

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/cyber-risk-levels.pdf

    Define the cyber risk levels that are used to describe vulnerabilities.…

  3. Vulnerability testing process

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/vulnerability-testing.pdf

    Guidance on when and how systems should be tested for security vulnerabilties…

  4. Best practice for device connectivity

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/best-practice-device-connectivity.pdf

    Document outlining the best practice for securing devices connecting to the University network…

  5. University cyber incident and data breach management procedure

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/university-cyber-incident-and-data-breach-management-procedure.pdf

    Protocol for managing suspected cyber/personal data breach…

  6. Supplier remote access requirements

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/supplier-remote-access-requirements.pdf

    Managing secure access to internal systems by third parties…

  7. Electronic data destruction and media disposal policy

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/data-destruction-policy.pdf

    This policy covers the destruction of electronic media that stores or has stored, University-owned data as defined within the Information Classification Policy…

  8. Use of generative AI - LLM

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/use-of-generative-ai---llm.pdf

    To communicate the risks as presently understood to maintaining the confidentiality, integrity and availability of University information and personal data in the use of publicly available GenAI tools…

  9. University information classification policy: implementation guide

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/information-classification-policy-implementation-guide.pdf

    Guidance on how to implement and work with the University information classification policy…

  10. University information classification policy

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/university-information-classification-policy.pdf

    Define how people should respond to protective markings when accessing, handling, storing, transmitting and disposing of information or data that is protectively marked…