![]() Owners will be identified for all assets and they will be responsible for the maintenance and protection of their assets. This control procedure defines the University’s approach to destruction of data and data processing equipment, and directly supports the following policy statement from the Information Security Policy:Īll assets (information, software, electronic information processing equipment, service utilities and people) will be documented and accounted for. Information Security training & awareness.High Performance Computing for research.Musculoskeletal Science and Sports Medicine.Education and Social Research Institute.Creative Writing, English Literature and Linguistics. ![]() Advanced Materials and Surface Engineering.Apprenticeship information for students.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |