User Tools

Site Tools


policies:information_resources_use_and_security_policy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
policies:information_resources_use_and_security_policy [2016/07/14 20:49] peterpolicies:information_resources_use_and_security_policy [2020/07/15 09:30] (current) – external edit 127.0.0.1
Line 224: Line 224:
 **System Administration** - the central administrative offices that provide oversight and coordination of the activities of the System and its Institutions. **System Administration** - the central administrative offices that provide oversight and coordination of the activities of the System and its Institutions.
  
-System Data (Data) - All Data or Information held on behalf of the System and its Institutions created as a result of and/or in support of the System business, or residing on System Information Resources, including paper records.+**System Data (Data)** - All Data or Information held on behalf of the System and its Institutions created as a result of and/or in support of the System business, or residing on System Information Resources, including paper records.
  
 **System Shared Data Centre** - any data centre governed by the Shared Data Centre group on behalf of the System. **System Shared Data Centre** - any data centre governed by the Shared Data Centre group on behalf of the System.
  
-**Systemwide Information Security Program** – the System policies, standards, procedures, elements, structure, strategies, objectives, plans, metrics, reports, resources, and services that establish requirements and provide for oversight and supplemental support for Institutional Information Security Programs.+**System-wide Information Security Program** – the System policies, standards, procedures, elements, structure, strategies, objectives, plans, metrics, reports, resources, and services that establish requirements and provide for oversight and supplemental support for Institutional Information Security Programs.
  
 **User** - an individual, automated application, or process that is authorized by the Owner to access the resource, in accordance with loca and country law, policy, and the Owner's procedures and rules.  Has the responsibility to (1) use the resource only for the purpose specified by the Owner, (2) comply with controls established by the Owner, and (3) prevent the unauthorized disclosure of Confidential Data.  The user is any person who has been authorized by the Owner of the information to read, enter, or update that information.  The User is the single most effective control for providing adequate security. **User** - an individual, automated application, or process that is authorized by the Owner to access the resource, in accordance with loca and country law, policy, and the Owner's procedures and rules.  Has the responsibility to (1) use the resource only for the purpose specified by the Owner, (2) comply with controls established by the Owner, and (3) prevent the unauthorized disclosure of Confidential Data.  The user is any person who has been authorized by the Owner of the information to read, enter, or update that information.  The User is the single most effective control for providing adequate security.
policies/information_resources_use_and_security_policy.1468529391.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki