Document search

17 results found for !nullquery
  1. Travelling with technology

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/travelling-with-technology.pdf

    Guidance for securing technology whilst travelling…

  2. University privacy notice: exchange of student personal data with partner institutions and other educational colloborations

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-data-protection-university-privacy-notice-exchange-of-student-personal-data-with-partner-institutions-and-other-educational-collaborations/university-privacy-notice---overseas-students.pdf

    To inform students how their personal details may be exchanged with partner institution or another body collaborating with the University to provide an educational experience, and how those data will be used.…

  3. Cyber risk levels

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/cyber-risk-levels.pdf

    Define the cyber risk levels that are used to describe vulnerabilities.…

  4. Vulnerability testing process

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/vulnerability-testing.pdf

    Guidance on when and how systems should be tested for security vulnerabilties…

  5. Best practice for device connectivity

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/best-practice-device-connectivity.pdf

    Document outlining the best practice for securing devices connecting to the University network…

  6. University cyber incident and data breach management procedure

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/university-cyber-incident-and-data-breach-management-procedure.pdf

    Protocol for managing suspected cyber/personal data breach…

  7. Supplier remote access requirements

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/supplier-remote-access-requirements.pdf

    Managing secure access to internal systems by third parties…

  8. Records Management Policy

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-records-management/records-management-policy.pdf

    To provide direction on how University records are to be managed to preserve their value.…

  9. Electronic data destruction and media disposal policy

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/data-destruction-policy.pdf

    This policy covers the destruction of electronic media that stores or has stored, University-owned data as defined within the Information Classification Policy…

  10. Use of generative AI - LLM

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/use-of-generative-ai---llm.pdf

    To communicate the risks as presently understood to maintaining the confidentiality, integrity and availability of University information and personal data in the use of publicly available GenAI tools…