Refined by:

Fully-matching results

Information Security Policy

https://www.bath.ac.uk/legal-information/information-security-policy/

Introduction. 1.1 The continued confidentiality, integrity and availability of University networks are essential to the operations of the University of Bath. ... 1.4 Senior Management will define relevant information security objectives, and monitor and

Bring Your Own Device (BYOD) Policy

https://www.bath.ac.uk/legal-information/bring-your-own-device-byod-po…

For the purpose of this policy, “endpoint device” refers to all forms of computing equipment that can store or access digital data, campus and University networks. ... DDaT/DD&T: Digital, Data and Technology Group. Endpoint device: All forms of

IT Acceptable Use Policy

https://www.bath.ac.uk/legal-information/it-acceptable-use-policy/

Exemption requests’ under this policy must be submitted to the Chief Information & Digital Officer (CIDO) or their designate. ... 3.2 The CISO is responsible for ensuring this policy is implemented across the University to ensure information and