17.3.11 Information Security

Compliance with information security policy is vital to ensuring the security of OIST information assets, and is the responsibility of all users. In protecting the university and its information assets users must comply with the rules herein when creating, processing or storing information.

In supporting the CISO to protect the interests of the University, systems administrators shall comply with all rules detailed herein, and comply promptly with directives from the CISO when given.

Table of Contents