The Breach Protocol provides guidance on the steps that TRU will follow when there is evidence that confidential information has been accessed without authorization.
This standard establishes the process for creating and maintaining “Generic/Shared Accounts” for network and system access.
Change Management establishes the process for controlling modifications to hardware, software, firmware, and documentation to ensure that information resources are protected against undocumented modification before, during, and after system implementation.
A standard addressing notebooks, netbooks, USB flash drives, and any other mobile storage media.
This standard explains how to securely configure and manage multi-function printers and copiers (MFDs) connected to the TRU network to protect university data.
Guidance on minimum password strength and usage for TRU systems.
Thompson Rivers University Policy Documents
Smart phones such as BlackBerrys and iPhones which are used to access University systems such as email, require a number of unique security measures.
Information security and privacy awareness training are an essential part of Thompson Rivers University’s (TRU) Information Security and Privacy Programs. TRU has made both online and face-to-face awareness training available to all members of the community.