°®°®Ö±²¥

Skip to Main Content

Data Security

Policies & Standards

°®°®Ö±²¥ Policies

These policies consists of high level statements relating to IT operations across the °®°®Ö±²¥. In addition, it should make references to the standards and guidelines that support it. From a legal and compliance perspective, these policies reflect the commitment from senior management to support IT operations.

IT Procedures & Standards

Standards consist of specific low level mandatory controls that help enforce and support the °®°®Ö±²¥ policies. Standards help to ensure consistency across the °®°®Ö±²¥ and usually contain controls relating to the implementation of specific technology, hardware or software. Procedures consist of step by step instructions to assist workers in implementing the various policies, standards and guidelines.

Data Security

The University does not own enterprise licenses for free antivirus solutions i.e. MalwareBytes. Installation of personal version on °®°®Ö±²¥ enterprise computers is against the End User License Agreement of the software provider. Computers detected running such applications will face sanctions including but not limited to immediate removal from the °®°®Ö±²¥ network.