• 17.8.8 Legislation Relevant to Information Security

    | Created on

    The following legislation is relevant to Information Security at OIST. Act on Prohibition of Unauthorized Computer Access Act on the Protection of...

  • 17.8.7 Information Security

    | Created on

    The underlying principles of information security are described on the OIST Information Security Website. https://groups.oist.jp/it/information-secur...

  • 17.8.6 Service Level Agreement (SLA)

    | Created on

    A Service Level Agreement (SLA) is a document defined in the ITSM standard. This document describes the level of service expected of IT Division by us...

  • 17.8.5 Information Technology Service Management (ITSM)

    | Created on

    Information Technology Service Management (ITSM) is a set of practices that focuses on aligning IT services with the needs of business. ...

  • 17.8.4 Devices

    | Created on

    Device is a synonym for Information Technology Assets [link: 17.8.3]. ...

  • 17.8.3 Information Technology Assets (IT Assets)

    | Created on

    The University defines IT Assets as all computer, communication devices and other technologies which access, store or transmit digital University Info...

  • 17.8.2 Information Assets

    | Created on

    The University defines its Information Assets as comprising of all University information; including but not limited to all research and administrativ...

  • 17.8.1 Information Technology Resources (IT Resources)

    | Created on

    The University defines its IT Resources as comprising of the set of all Information assets, and Information Technology Assets (IT Assets). ...

  • 17.8 Definitions

    | Created on

    ...

  • 17.7 Contacts

    | Created on

    Policy Owner: Chief Information Officer ...

Search found 402 items