Information Security policies and procedures
Information Security Policies
Information Security policies and procedures ensure that everyone across the University is fully equipped with the knowledge and resources to understand our security objectives and to protect our information.
Information Security Control Procedures
Information Security Control Procedures outline how we will keep information secure.
These procedures directly support the Information Security Policy and Information Risk Management Policy.
Control procedures are listed below.
If you would like more information about specific procedures, please contact the Information Security Team. Email: infosecurity@mmu.ac.uk
- Acceptable Use
- Access Control
- Clear Desk and Screen
- Cloud Computing
- Communications Security
- Compliance
- Cryptography
- Data Destruction
- Information Governance Incident Management
- Information Classification
- Log Management and Forensic Readiness
- Mobile and Remote Access
- Password Management
- Pre-employment Checks
- Projects
- Responsible Disclosure
- Risk Assessment
- Student Regulations
- Supplier Relationships
- Threat and Vulnerability Management
- Training and Awareness
- Web and Application Development Standards