IT corporate information
- Type
- Policy
Acceptable use policy
Outlines the University’s approach to acceptable use of its computing facilities
- Type
- Policy
Access control policy
Outlines the University’s approach to access control of its computing facilities
- Type
- Factsheet
Accessibility statements for third party systems
Find advice on using our websites and systems, plus instructions on overcoming known accessibility issues
- Type
- Policy
Asset management policy
Outlines the University’s approach to management of its information technology assets
- Type
- Policy
Client Device Policy
Key policy facts, responsibilities, and processes in relation to the management of client devices for University employees and research postgraduate students
- Type
- Policy
Cyber vulnerability management policy
This policy provides cybersecurity strategy and aims for a secure IT environment.
- Type
- Factsheet
Data protection for remote working
How personal data must be stored, shared, and used when remote / home working
- Type
- Policy
Disposal of all waste electronic and electrical equipment
Our policy on how to dispose of waste electrical and electronic equipment (WEEE)
- Type
- Policy
Electronic messaging policy
Outlines the University’s approach to use of its electronic messaging facilities
- Type
- Policy
Electronic Signing Policy
This policy sets out how e-signatures are to be used in the University and also the underpinning principles to support electronic business models
- Type
- Policy
Incident response management policy
Outlines the University’s approach to incident response including planning for and actively managing incidents.
- Type
- Policy
Information security awareness policy
Outlines the University’s approach to information security awareness
- Type
- Policy
Information security policy
Outlines the University’s approach to information security management
- Type
- Policy
IT policies - relevant legislation
The governance underpinning the University of Dundee information and cyber security policies, standards, and other guidance
- Type
- Policy
Laptop Loan Scheme Terms and Conditions
Outlines the university's long and short term loan of university equipment to students
- Type
- Policy
Malware defense policy
Outlines the University’s approach to anti-virus/malware protection for its computing facilities
- Type
- Policy
Mobile and bring your own device (BYOD) policy
Outlines the University’s approach to use of mobile devices and ‘bring your own device’ (BYOD)
- Type
- Policy
Patch management policy
Outlines the University’s approach to the patch management of its infrastructure assets
- Type
- Policy
Recording meetings Data Protection guidance
The following relates specifically to recording online meetings or group calls.
- Type
- Policy
Remote access policy
Outlines the University’s approach to remote access to its computing facilities