Search20 Results
- Knowledge Base
- Information Security
- Standards & Policies
Information security and privacy awareness training are an essential part of Thompson Rivers University’s (TRU) Information Security and Privacy Programs. TRU has made both online and face-to-face awareness training available to all members of the community.
- Knowledge Base
- Information Security
- Standards & Policies
- Knowledge Base
- Information Security
- Knowledge Base
- Application and Software
- Microsoft 365
- Microsoft 365 Frequently Asked Questions
- Knowledge Base
- Information Security
- Standards & Policies
Thompson Rivers University Policy Documents
- Knowledge Base
- Information Security
Need desktop encryption, anti-virus, link scanner, spyware, password management, or firewall tools? Choose one or more of the items listed inside.
- Knowledge Base
- Information Security
- Standards & Policies
Guidance on minimum password strength and usage for TRU systems.
- Knowledge Base
- Information Security
All of us are concerned about personal and financial information, and while TRU employs good security and technological safeguards, your help is needed to protect confidential information. Following these 10 steps is a simple and effective way to reduce the risk of theft or misuse of yours and others personal and financial information.
- Knowledge Base
- Information Security
- Knowledge Base
- Information Security
- Knowledge Base
- Information Security
- Knowledge Base
- Information Security
- Standards & Policies
Change Management establishes the process for controlling modifications to hardware, software, firmware, and documentation to ensure that information resources are protected against undocumented modification before, during, and after system implementation.
- Knowledge Base
- Information Security
- Standards & Policies
This standard establishes the process for creating and maintaining “Generic/Shared Accounts” for network and system access.
- Knowledge Base
- Information Security
- Standards & Policies
MFDs now combine printing, fax, scanning, email, and copy functions and include the ability to store and share large amounts of data over networks. This standard addresses the minimum configuration to meet the University's security requirements.
- Knowledge Base
- Information Security
- Standards & Policies
A standard addressing notebooks, netbooks, USB flash drives, and any other mobile storage media.