Document search

25 results found for !nullquery
  1. Travelling with technology

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/travelling-with-technology.pdf

    Guidance for securing technology whilst travelling…

  2. Cyber risk levels

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/cyber-risk-levels.pdf

    Define the cyber risk levels that are used to describe vulnerabilities.…

  3. Vulnerability testing process

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/vulnerability-testing.pdf

    Guidance on when and how systems should be tested for security vulnerabilties…

  4. Supplier remote access requirements

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/supplier-remote-access-requirements.pdf

    Managing secure access to internal systems by third parties…

  5. Maintaining the security of credit & debit card data - policy

    Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/maintaining-the-security-of-credit-&-debit-card-data---policy.pdf

    Policy to cover PCI-DSS compliance (credit / debit cards)…