IT Security Standard: Computing Devices - Responsibilities

Designated Management Authority

  • Strictly observes all laws, regulations, policies, standards and procedures related to security of information and information technology resources in their area.
  • Responsible for and shall take reasonable measures for implementation of, and compliance with, the Computing Device Standard for devices within their areas.

Computing Device Administrators/Application Administrators

  • Strictly observes all laws, regulations, policies, standards and procedures related to security of information and information technology resources in their area.
  • Prepares and maintains procedures and documentation in compliance with the Computing Device Standard for assigned devices.
  • Executes device administration procedures in compliance with the Computing Device Standard for assigned devices.

Computing Device Users

  • Strictly observes all laws, regulation, policies, standards and procedures related to security of information and systems used.
  • Protects the privacy rights of University faculty, staff and students.
  • Protects the physical security of data and systems assigned to them.
  • Reports suspected violations of security policies and procedures for university data and systems to their supervisor who will report it to the Information Security Officer and/or Information Technology Services depending on the nature of the violation.

 


Return to Table of Contents

Related Content