The purpose of information security [link: 17.8.7] is to protect Information Assets from unauthorized access or damage, and ensure accordance with all...
Wherever possible University IT resources are to be provisioned in alignment with industry best practice. To this end the ITSM framework is employed t...
To obtain authorization to operate a University Vehicle, complete and submit a Form in accordance with the rules determined by the Vice President for ...