Skip to main content

Data Security Guidelines for outsourcing and third party compliance

People who source a service from a third party that would give them direct access to University data need to understand this document.


Policy


These guidelines support the Information Security Policy.

Accessible alternatives

If you need any of the attachments on this page in accessible formats such as braille, large print, audio transcript, or other file formats, please contact the owner of this page.