Search
Search module
Curator - center
Fully-matching results
Information Security Policy
https://www.bath.ac.uk/legal-information/information-security-policy/Introduction. 1.1 The continued confidentiality, integrity and availability of University networks are essential to the operations of the University of Bath. ... 1.4 Senior Management will define relevant information security objectives, and monitor and
Bring Your Own Device (BYOD) Policy
https://www.bath.ac.uk/legal-information/bring-your-own-device-byod-po…For the purpose of this policy, “endpoint device” refers to all forms of computing equipment that can store or access digital data, campus and University networks. ... DDaT/DD&T: Digital, Data and Technology Group. Endpoint device: All forms of
IT Acceptable Use Policy
https://www.bath.ac.uk/legal-information/it-acceptable-use-policy/Exemption requests’ under this policy must be submitted to the Chief Information & Digital Officer (CIDO) or their designate. ... 3.2 The CISO is responsible for ensuring this policy is implemented across the University to ensure information and