• 17.8.14 Escalated Privileges

    | Created on

    Privileges which allow users access to information assets or IT resources to a level beyond that normally permitted. ...

  • 17.8.13 Information Asset Administrator

    | Created on

    Individuals tasked with ensuring appropriate handing of OIST information assets. ...

  • 17.8.12 Information Asset Manager

    | Created on

    Individuals accountable for defining the classification level, authorizing access to, and ensuring an appropriate permission scheme for the informatio...

  • 17.3.32 Further Policies Rules and Procedures

    | Created on

    Faculty or Vice Presidents within the University may impose additional rules and procedures upon the use of OIST information assets. Such additional r...

  • 17.3.31 Logging and monitoring

    IT Division shall as a matter of course collect and analyze logging information from IT resources in order to detect intrusion or misuse. IT Division ...

  • 17.3.30 Hosting of hardware in OIST IT facilities

    | Created on

    Any party at OIST wishing to purchase and/or house hardware (including servers and storage) into OIST IT facilities must consult with IT Division. Fai...

  • 17.3.28 Operation and Management

    17.3.28.1  Business continuity planning Information asset managers and IT Division shall develop business continuity plans, ensuring the availab...

  • 17.3.27 Web presence

    | Created on

    17.3.27.1  Domain name management IT Division manages the oist.jp domain on behalf of the Communications and Public Relations division. Resea...

  • 17.3.26 Training

    17.3.26.1  User training Supervisors are responsible for ensuring that a user is properly trained with regard to information security prior to c...

  • 17.3.25 Intrusion prevention

    | Created on

    The system administrators shall implement the following controls in order to prevent intrusion into servers and systems; Delete or turn off unneces...