You may find the Information System Security Policies from Imperial College
a useful starting point. They are available at
http://www.cc.ic.ac.uk/security/
Roger Stein
> -----Original Message-----
> From: Marlene Bertrand [SMTP:[log in to unmask]]
> Sent: 16 October 2001 11:12
> To: [log in to unmask]
> Subject: Re: Data Security Policy
>
> Hi,
>
> I would be interested in getting such a policy too. Please can you send
> me
> a copy too.
>
> Thanks
>
>
> Marlene
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]]On Behalf Of Smith, Barbara
> Sent: 16 October 2001 10:41
> To: [log in to unmask]
> Subject: Data Security Policy
>
>
> Hi,
>
> Do any other HE institutions have a Data Security Policy they would be
> willing to share with us? We are trying to produce one ourselves and would
> like to know how others cover the broader aspects of security than just
> the
> security of electronic data.
>
> Please contact me direct if you wish,
> Barbara
>
> *******************************************************
> Barbara Smith
> Deputy Librarian
> Queen Margaret University College
> Clerwood Terrace
> Edinburgh
> EH12 8TS
>
> Tel: 0131-317-3175
> Fax: 0131-339-7057
> Email: [log in to unmask]
>
> ***********************************************************
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|