Search20 Results
- Knowledge Base
- Software
Need desktop encryption, anti-virus, link scanner, spyware, password management, or firewall tools? Choose one or more of the items listed inside.
- Knowledge Base
- Software
- Microsoft 365
- Microsoft 365 Frequently Asked Questions
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
Guidance on minimum password strength and usage for TRU systems.
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
This standard explains how to securely configure and manage multi-function printers and copiers (MFDs) connected to the TRU network to protect university data.
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
Annual security and privacy awareness training is mandatory and must be completed by all new employees within the first month of employment.
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
Information security and privacy awareness training are an essential part of Thompson Rivers University’s (TRU) Information Security and Privacy Programs. TRU has made both online and face-to-face awareness training available to all members of the community.
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
Thompson Rivers University Policy Documents
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
All of us are concerned about personal and financial information, and while TRU employs good security and technological safeguards, your help is needed to protect confidential information. Following these 10 steps is a simple and effective way to reduce the risk of theft or misuse of yours and others personal and financial information.
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
Change Management establishes the process for controlling modifications to hardware, software, firmware, and documentation to ensure that information resources are protected against undocumented modification before, during, and after system implementation.
- Knowledge Base
- TRUEmployee & oneTRU
- Information Security
- Standards & Policies
This standard establishes the process for creating and maintaining “Generic/Shared Accounts” for network and system access.