17.3 Rules
- 17.3.1 Authorization and Access
- 17.3.2 Bring Your Own Device (BYOD)
- 17.3.3 Connecting to the OIST Network
- 17.3.4 Procurement, Outsourcing and IT Assets
- 17.3.5 Enterprise Applications
- 17.3.6 Outsourcing of IT Services
- 17.3.7 Outsourcing and Information Security
- 17.3.8 Software and licensing
- 17.3.9 Information Asset classification
- 17.3.10 Protection of Information Assets
- 17.3.11 Information Security
- 17.3.12 Information Security Incident Response
- 17.3.13 Data Forensics
- 17.3.14 IT Asset Removal
- 17.3.15 Labeling
- 17.3.16 Copying
- 17.3.17 E-mail
- 17.3.18 Prevention of information leakage or manipulation in transit
- 17.3.19 Use of removable media
- 17.3.20 Remote access
- 17.3.21 Information disposal
- 17.3.22 IT Asset Security
- 17.3.23 Protection against malicious software
- 17.3.24 Mitigation of threats to IT Services
- 17.3.25 Intrusion prevention
- 17.3.26 Training
- 17.3.27 Web presence
- 17.3.28 Operation and Management
- 17.3.29 Access to OIST IT facilities
- 17.3.30 Hosting of hardware in OIST IT facilities
- 17.3.31 Logging and monitoring
- 17.3.32 Further Policies Rules and Procedures
Policy Library Search
Table of Contents
- Policy Library
- 00. About the Policies, Rules & Procedures Library
- 01. Who We Are: Founding and Governing Principles
- 02. Governance and Organization
- 03. Faculty Handbook
- 04. Research Activities
- 05. Graduate School
- 06. University Library
- 07. Fundraising
- 08. Internal audit
- 09. Auditors' Audit
- 10. Land, Buildings and Facilities
- 11. Personal Information Protection
- 12. Corporate Records Management
- 13. Safety, Health & Environmental Protection
- 14. Intellectual Property and Technology Transfer
- 15. Name Use, Endorsements, Use of University Logo and Trademarks
- 16. External and Internal Communications & Public Relations
- 17. Information Technology and Security
- 17.1 Policy
- 17.2 General Considerations
- 17.3 Rules
- 17.3.1 Authorization and Access
- 17.3.2 Bring Your Own Device (BYOD)
- 17.3.3 Connecting to the OIST Network
- 17.3.4 Procurement, Outsourcing and IT Assets
- 17.3.5 Enterprise Applications
- 17.3.6 Outsourcing of IT Services
- 17.3.7 Outsourcing and Information Security
- 17.3.8 Software and licensing
- 17.3.9 Information Asset classification
- 17.3.10 Protection of Information Assets
- 17.3.11 Information Security
- 17.3.12 Information Security Incident Response
- 17.3.13 Data Forensics
- 17.3.14 IT Asset Removal
- 17.3.15 Labeling
- 17.3.16 Copying
- 17.3.17 E-mail
- 17.3.18 Prevention of information leakage or manipulation in transit
- 17.3.19 Use of removable media
- 17.3.20 Remote access
- 17.3.21 Information disposal
- 17.3.22 IT Asset Security
- 17.3.23 Protection against malicious software
- 17.3.24 Mitigation of threats to IT Services
- 17.3.25 Intrusion prevention
- 17.3.26 Training
- 17.3.27 Web presence
- 17.3.28 Operation and Management
- 17.3.29 Access to OIST IT facilities
- 17.3.30 Hosting of hardware in OIST IT facilities
- 17.3.31 Logging and monitoring
- 17.3.32 Further Policies Rules and Procedures
- 17.4 Right and Responsibilities
- 17.5 Procedures
- 17.6 Forms
- 17.7 Contacts
- 17.8 Definitions
- 18. Telecommunications Services and Devices
- 19. University Events
- 20. Health & Wellness Program
- 21. Use of University Resources
- 22. Conflicts of Interest Management and Security Export Control
- 23. Investigation and Determination of Misconduct & Whistleblower Protection
- 24. Childcare Services
- 25. Housing
- 26. Finance and Accounting
- 27. Budget Planning, Execution and Monitoring
- 28. Procurement
- 29. Travel,Meetings and Related Expenses
- 30. Human Resources
- 31. Hiring Process
- 32. Work Schedules and Breaks
- 33. Leave
- 34. Compensation
- 35. Benefits
- 36. Performance Evaluation
- 37. Leaving the University
- 38. Discipline
- 39. Resolving Complaints & Disputes
- 40. Staff Development and Awards
- 41. Workplace Health and Safety
- 42.University Ombudsperson
- 43.OIST University Press