Document search
Fully-matching results
-
Guidance for booking vehicle hires when on university business (including car, van and minibus rentals)
Password protected https://www.st-andrews.ac.uk/policy/purchasing-and-procurement-buying/internal/guidance-for-booking-vehicle-hires.pdfVehicle guidance.…
-
Method of ordering goods and services
Password protected https://www.st-andrews.ac.uk/policy/purchasing-and-procurement-buying/internal/methods-of-ordering-goods-and-services.pdfThis document is designed to advise staff on the appropriate methods to be used when purchasing goods and services.…
-
Financial Regulations
https://www.st-andrews.ac.uk/policy/financial-matters-legal-regulations/financial-regulations.pdfOutline the Financial Control Framework in place at the University…
-
Scheme of delegation
https://www.st-andrews.ac.uk/policy/financial-matters-legal-regulations/scheme-of-delegation.pdfList of authorities delegated by Court…
-
Staff death protocol
Password protected https://www.st-andrews.ac.uk/policy/staff-employee-relations-ill-health/internal/death-in-service.pdfThis guidance outlines the actions to be taken when an employee dies in service.…
-
Asbestos Policy
Password protected https://www.st-andrews.ac.uk/policy/estate-facilities-construction-and-development/internal/asbestos-policy.pdfThis policy document sets out the University policy statement and the organisational and managerial arrangements necessary to deliver it…
-
Inventory Management Policy
https://www.st-andrews.ac.uk/policy/financial-matters-asset-management/inventory-management-policy.pdfTo set out the University’s policy and approach to effective management of inventory stock within schools and units…
-
Travelling with technology
Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/travelling-with-technology.pdfGuidance for securing technology whilst travelling…
-
Vulnerability testing process
Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/vulnerability-testing.pdfGuidance on when and how systems should be tested for security vulnerabilties…
-
Cyber risk levels
Password protected https://www.st-andrews.ac.uk/policy/information-governance-and-management-information-security/internal/cyber-risk-levels.pdfDefine the cyber risk levels that are used to describe vulnerabilities.…