Related Articles (11)

The Breach Protocol provides guidance on the steps that TRU will follow when there is evidence that confidential information has been accessed without authorization.
This standard establishes the process for creating and maintaining “Generic/Shared Accounts” for network and system access.
Change Management establishes the process for controlling modifications to hardware, software, firmware, and documentation to ensure that information resources are protected against undocumented modification before, during, and after system implementation.
A standard addressing notebooks, netbooks, USB flash drives, and any other mobile storage media.
This standard explains how to securely configure and manage multi-function printers and copiers (MFDs) connected to the TRU network to protect university data.
Guidance on minimum password strength and usage for TRU systems.
Thompson Rivers University Policy Documents
Smart phones such as BlackBerrys and iPhones which are used to access University systems such as email, require a number of unique security measures.