• 17.4.10 Privileged users and System Administrators

    | Created on

    All users granted escalated privileges, including System Administrators, are responsible for the application of this and related policies to the IT re...

  • 17.4.8 Information Asset Manager

    | Created on

    Information Asset Managers are accountable for defining the classification level of, authorizing access to, and ensuring an appropriate permission sch...

  • 17.4.4 Vice Presidents, Senior Managers and Managers

    | Created on

    Vice-Presidents are responsible for nominating Information Asset Managers to manage information Assets within their remit. Vice-Presidents, Senior ...

  • 17.4.3 Faculty

    | Created on

    Faculty members serve as Information Asset Manager [link: 17.4.8] for information assets within their purview, and may delegate the Information Asset ...

  • 17.4.2 User’s rights and responsibilities

    | Created on

    Users [link: 17.8.11] are granted access to IT resources in order to conduct University business. In using these resources, users agree to abide by al...

  • 17.4 Right and Responsibilities

    | Created on

    ...

  • 17.3.6 Outsourcing of IT Services

    | Created on

    Where contracting with an external party to provide a service or system that will store, transmit or receive OIST information assets, additional consi...

  • 17.3.5 Enterprise Applications

    | Created on

    An enterprise application is defined as any administrative system key in conducting University business. The functionality and quality of these system...

  • 17.3.4 Procurement, Outsourcing and IT Assets

    | Created on

    OIST IT Asset purchases must be fit for purpose. They must also be procured, audited, re-used and disposed of appropriately. In addition to University...

  • 17.3.3 Connecting to the OIST Network

    | Created on

    The OIST network is an essential research resource, maintaining its availability and security is vital to the function of the University and is the re...