Skip to main content
English
日本語
Search form
Search
Toggle navigation
Home
Education
Admissions
Apply
Internships
Graduate School Office
Innovation
Available Technologies
Industry Partnerships
Startup Programs
Incubator Facility
News
Articles
Press Releases
Videos
OIST on Vimeo
Photos
OIST on Flickr
OIST in the News
Keyword List
Groups
Policy Library
17. Information Technology and Security
17.8 Definitions
17.8.4 Devices
17.8.4 Devices
Device is a synonym for Information Technology Assets [link:
17.8.3
].
‹ 17.8.3 Information Technology Assets (IT Assets)
up
17.8.5 Information Technology Service Management (ITSM) ›
Policy Library Search
Search
Table of Contents
Policy Library
00. About the Policies, Rules & Procedures Library
01. Who We Are: Founding and Governing Principles
02. Governance and Organization
03. Faculty Handbook
04. Research Activities
05. Graduate School
06. University Library
07. Fundraising
08. Internal audit
09. Auditors' Audit
10. Land, Buildings and Facilities
11. Personal Information Protection
12. Corporate Records Management
13. Safety, Health & Environmental Protection
14. Intellectual Property and Technology Transfer
15. Name Use, Endorsements, Use of University Logo and Trademarks
16. External and Internal Communications & Public Relations
17. Information Technology and Security
17.1 Policy
17.2 General Considerations
17.3 Rules
17.4 Right and Responsibilities
17.5 Procedures
17.6 Forms
17.7 Contacts
17.8 Definitions
17.8.1 Information Technology Resources (IT Resources)
17.8.2 Information Assets
17.8.3 Information Technology Assets (IT Assets)
17.8.4 Devices
17.8.5 Information Technology Service Management (ITSM)
17.8.6 Service Level Agreement (SLA)
17.8.7 Information Security
17.8.8 Legislation Relevant to Information Security
17.8.9 Information classification and device eligibility
17.8.10 Information System (System)
17.8.11 Users
17.8.12 Information Asset Manager
17.8.13 Information Asset Administrator
17.8.14 Escalated Privileges
17.8.15 Privileged users
17.8.16 System Administrator
17.8.17 Identity Management System (IDM)
17.8.18 Server
17.8.19 Storage media
17.8.20 Removable media
17.8.21 Security erase
17.8.22 Outsourcing
17.8.23 Entity
17.8.24 Entity Authentication
17.8.25 Identification
17.8.26 Access control
17.8.27 Access right management
17.8.28 Account
17.8.29 Encryption
17.8.30 Malicious program (Malware)
17.8.31 Anti-malware definition file
17.8.32 CMDB
17.8.33 Software catalog
17.8.34 Disaster recovery and Business continuity planning
17.8.35 Information security incident
17.8.36 An advanced persistent threat (APT)
18. Telecommunications Services and Devices
19. University Events
20. Health & Wellness Program
21. Use of University Resources
22. Conflicts of Interest Management and Security Export Control
23. Investigation and Determination of Misconduct & Whistleblower Protection
24. Childcare Services
25. Housing
26. Finance and Accounting
27. Budget Planning, Execution and Monitoring
28. Procurement
29. Travel,Meetings and Related Expenses
30. Human Resources
31. Hiring Process
32. Work Schedules and Breaks
33. Leave
34. Compensation
35. Benefits
36. Performance Evaluation
37. Leaving the University
38. Discipline
39. Resolving Complaints & Disputes
40. Staff Development and Awards
41. Workplace Health and Safety
42.University Ombudsperson
43.OIST University Press