Document search

8 results found for !nullquery
  1. Electronic data destruction and media disposal policy

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/data-destruction-policy.pdf

    To guide staff in how media should dealt with, to prevent data being readable…

  2. Travelling with technology

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/travelling-with-technology.pdf

    Guidance for securing technology whilst travelling…

  3. Best practice for device connectivity

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/best-practice-device-connectivity-.pdf

    Document outlining the best practice for securing devices connecting to the University network…

  4. Supplier remote access requirements

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/supplier-remote-access-requirements.pdf

    Managing secure access to internal systems by third parties…

  5. University information classification policy: implementation guide

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/information-classification-policy-implementation-guide.pdf

    Guidance on how to implement and work with the University information classification policy…

  6. University information classification policy

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/university-information-classification-policy.pdf

    Define how people should respond to protective markings when accessing, handling, storing, transmitting and disposing of information or data that is protectively marked…

  7. University cyber incident and data breach management procedure

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/university-cyber-incident-and-data-breach-management-procedure.pdf

    Protocol for managing suspected data/personal data breach…

  8. Access to information during periods of staff absence

    https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/access-to-information-during-periods-of-absence.pdf

    This Policy defines the circumstances under which access to information held in email and files can be made during periods of absence, for business continuity purposes.…