(1) The (2) All users interacting with information (3) The University must perform checks to ensure that the individual user is suitable for access to the University’s ICT systems and the information held on these systems. (4) Users must be trained, equipped and periodically reminded to use information securely. (5) When employment ends with the (6) Where there is a change in role for a user, the information access privileges must be reviewed and changed accordingly on a ‘least privilege’ basis. (7) The intent of this guideline is to govern the human resources aspect of information security for employees of the (8) For the purpose of this guideline, Employees of the University is anyone who is engaged by the University to provide service to the University regardless of the job function, including: (9) To develop a comprehensive process that includes identification of job roles and responsibilities, identify the corresponding candidate screening level for those roles and responsibilities and establish (10) Prior to hiring or contracting employees or companies, security roles and responsibilities should be clearly articulated in job descriptions or well defined in (11) For roles involving handling of restricted or high-restricted information or access to sensitive ICT systems careful attention should be paid to validation of references and the appropriate level of background checks as determined by the security roles and responsibilities of the position or contract. (12) Consideration should be given that the receipt of affirmative references and the successful completion of a background check at a level commensurate with the position’s roles and responsibilities be a condition of employment. (13) To ensure that employees are aware of and understand their roles and responsibilities; to ensure that they understand information security threats and; to ensure they have the necessary knowledge to mitigate those threats. (14) All new employees should participate in new employee orientation and be provided with pertinent information including security policies and procedures and potential disciplinary process/actions for any security breaches. (15) New employees should be required to acknowledge that they read and understand the University’s Information Technology Conditions of Use Policy. All managers and (16) All employees must complete Information Security Awareness Training annually on basic information security practices and acknowledge their understanding of the institution’s security policies and procedures. (17) To develop an orderly exit process to ensure that access is removed and (18) Responsibilities for performing employee terminations must be clearly defined and assigned to ensure actions are taken as quickly as possible. A checklist listing actions to be taken and the person responsible for the execution of that action allows for quick identification of any missed steps. (19) Specifically, there should be a process that validates that all institution’s (20) Additionally, there should be a process that ensures access to information (21) Things to do: (22) Things to avoid: (23) Things to pay attention to: (24) Things to report: (25) Things to do: (26) Things to pay attention to: (27) Things to establish procedures for: (28) Things to monitor: (29) Things to report: (30) Things to reinforce with Information Security Human Resource Guidelines
Section 1 - Guidelines
Executive Summary
Purpose
Scope
Prior to Employment
Objective
During Employment
Objective
Termination and Change of Employment
Objective
Section 2 - Roles and Responsibilities
Responsibilities of all Employees
Responsibilities of Management
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.