Refined by:

Fully-matching results

Information Security Policy

https://www.bath.ac.uk/legal-information/information-security-policy/

Introduction. 1.1 The continued confidentiality, integrity and availability of University networks are essential to the operations of the University of Bath. ... 1.4 Senior Management will define relevant information security objectives, and monitor and

Industrial Strategy

https://www.bath.ac.uk/guides/industrial-strategy/

linking everyone to jobs, training and services through better physical and digital infrastructure, that is accessible, sustainable and low carbon. ... Providing businesses with the space, networks and skills they need to boost productivity, grow and

Thumbnail for Industrial Strategy

Bring Your Own Device (BYOD) Policy

https://www.bath.ac.uk/legal-information/bring-your-own-device-byod-po…

For the purpose of this policy, “endpoint device” refers to all forms of computing equipment that can store or access digital data, campus and University networks. ... DDaT/DD&T: Digital, Data and Technology Group. Endpoint device: All forms of

IT Acceptable Use Policy

https://www.bath.ac.uk/legal-information/it-acceptable-use-policy/

Exemption requests’ under this policy must be submitted to the Chief Information & Digital Officer (CIDO) or their designate. ... 3.2 The CISO is responsible for ensuring this policy is implemented across the University to ensure information and