Users are responsible for ensuring that information exchanged via e-mail is protected to a level commensurate with the classification of the informati...
Information assets must have their document classification clearly marked on the cover page, footer, header or watermark regardless of format. Includi...
Any breach of information security, or misuse of IT Resources is regarded as serious. Breaches may result in disciplinary action, up to and including ...
Beyond the policies and procedures regarding usage of the IT Resources as detailed herein, all users are expected to exercise sound judgment, and in s...
For reporting and investigation procedures in the case of any misconduct or suspicion thereof in research activities and use of research grants, see C...
The University's research facilities and services are primarily for use in research and academic activities of the University, but when there is some ...