policies:information_resources_use_and_security_policy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
policies:information_resources_use_and_security_policy [2016/07/14 20:46] – peter | policies:information_resources_use_and_security_policy [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 73: | Line 73: | ||
**Controlled Data** - one of three data classifications defined within the System Data Classification Standard. The “Controlled” classification applies to information/ | **Controlled Data** - one of three data classifications defined within the System Data Classification Standard. The “Controlled” classification applies to information/ | ||
- | **Data** - elemental units, regardless of form or media, that are combined to create information used to support research, teaching, patient care, and other University | + | **Data** - elemental units, regardless of form or media, that are combined to create information used to support research, teaching, patient care, and other System |
**Data Centre** - a facility used to house computer systems and associated components, such as telecommunications and storage systems. | **Data Centre** - a facility used to house computer systems and associated components, such as telecommunications and storage systems. | ||
Line 116: | Line 116: | ||
**Information Resources Custodian (Custodian)** - an individual, department, Institution, | **Information Resources Custodian (Custodian)** - an individual, department, Institution, | ||
- | **Information Resources Manager (IR**M) - the executive responsible for Information Resources across the whole of the institution. | + | **Information Resources Manager (IRM)** - the executive responsible for Information Resources across the whole of the institution. |
**Information Resources Owner (Owner)** - the manager or agent responsible for the business function that is supported by the Information Resource or the individual upon whom responsibility rests for carrying out the program that uses the resources. | **Information Resources Owner (Owner)** - the manager or agent responsible for the business function that is supported by the Information Resource or the individual upon whom responsibility rests for carrying out the program that uses the resources. | ||
Line 122: | Line 122: | ||
**Information Security Administrator** - a departmental employee, designated by management, who assists with information security tasks as described in **Information Resources Security Responsibilities and Accountability**. | **Information Security Administrator** - a departmental employee, designated by management, who assists with information security tasks as described in **Information Resources Security Responsibilities and Accountability**. | ||
- | **Information Security Program** - the Policies, Standards, Procedures, Guidelines, elements, structure, strategies, objectives, plans, metrics, reports, resources, and services adopted for the purpose of securing | + | **Information Security Program** - the Policies, Standards, Procedures, Guidelines, elements, structure, strategies, objectives, plans, metrics, reports, resources, and services adopted for the purpose of securing |
- | **Information | + | **Information |
**Information Technology (IT)** - the hardware, software, services, supplies, personnel, facilities, maintenance, | **Information Technology (IT)** - the hardware, software, services, supplies, personnel, facilities, maintenance, | ||
Line 188: | Line 188: | ||
**Remote Access** - access to Information Resources that originates from a Remote Location. | **Remote Access** - access to Information Resources that originates from a Remote Location. | ||
- | **Remote Location** - a location outside the physical boundary of the Institution (inclusive of University | + | **Remote Location** - a location outside the physical boundary of the Institution (inclusive of leased/ |
**Residual Risk** - the risk (Low, Moderate, or High) that remains after security controls have been applied. | **Residual Risk** - the risk (Low, Moderate, or High) that remains after security controls have been applied. | ||
Line 196: | Line 196: | ||
**Researcher** - Lead Researchers, | **Researcher** - Lead Researchers, | ||
- | **Risk** – a function of the likelihood that a threat will exploit a vulnerability and the resulting impact to University | + | **Risk** – a function of the likelihood that a threat will exploit a vulnerability and the resulting impact to System |
**Scheduled Change** - a change to an Information Resource made under normal working conditions following formally defined change control processes as defined in Change Management. | **Scheduled Change** - a change to an Information Resource made under normal working conditions following formally defined change control processes as defined in Change Management. | ||
Line 224: | Line 224: | ||
**System Administration** - the central administrative offices that provide oversight and coordination of the activities of the System and its Institutions. | **System Administration** - the central administrative offices that provide oversight and coordination of the activities of the System and its Institutions. | ||
- | System Data (Data) - All Data or Information held on behalf of the System and its Institutions created as a result of and/or in support of the System business, or residing on System Information Resources, including paper records. | + | **System Data (Data)** - All Data or Information held on behalf of the System and its Institutions created as a result of and/or in support of the System business, or residing on System Information Resources, including paper records. |
**System Shared Data Centre** - any data centre governed by the Shared Data Centre group on behalf of the System. | **System Shared Data Centre** - any data centre governed by the Shared Data Centre group on behalf of the System. | ||
- | **Systemwide | + | **System-wide |
**User** - an individual, automated application, | **User** - an individual, automated application, |
policies/information_resources_use_and_security_policy.1468529169.txt.gz · Last modified: 2020/07/15 09:30 (external edit)