Search20 Results

Guidance on minimum password strength and usage for TRU systems.
All of us are concerned about personal and financial information, and while TRU employs good security and technological safeguards, your help is needed to protect confidential information. Following these 10 steps is a simple and effective way to reduce the risk of theft or misuse of yours and others personal and financial information.
Information security and privacy awareness training are an essential part of Thompson Rivers University’s (TRU) Information Security and Privacy Programs. TRU has made both online and face-to-face awareness training available to all members of the community.
Change Management establishes the process for controlling modifications to hardware, software, firmware, and documentation to ensure that information resources are protected against undocumented modification before, during, and after system implementation.
This standard establishes the process for creating and maintaining “Generic/Shared Accounts” for network and system access.
MFDs now combine printing, fax, scanning, email, and copy functions and include the ability to store and share large amounts of data over networks. This standard addresses the minimum configuration to meet the University's security requirements.
A standard addressing notebooks, netbooks, USB flash drives, and any other mobile storage media.
Smart phones such as BlackBerrys and iPhones which are used to access University systems such as email, require a number of unique security measures.
The Breach Protocol provides guidance on the steps that TRU will follow when there is evidence that confidential information has been accessed without authorization.